Alerts left arrow     right arrow

Internal Revenue Service Report Tax Recovery - Virus Email Message

Edit
Internal Revenue Service Report Tax Recovery - Virus Email Message

The email message below: "Internal Revenue Service report", has a virus or Trojan horse attached to it that will infect your Windows computer if you open it. The message was designed to trick the recipients into opening the malicious attachment, disguised as Internal Revenue Service (IRS) report, thinking that they are opening a report that will show them their tax rebate.

Please continue below.

The Virus Email Message - Internal Revenue Service Report

Subject:  Internal Revenue Service report
Attachment: IRS_EA75A0CF0A.zip

Dear

After the last yearly estimations of your fiscal activity we have determined that you are eligible to tax recovery of $2356.47. Please confirm the tax rebate claim and allow us 3-9 days in order to process it.

A refund can be delayed for a variety of reasons. For example submitting invalid records or applying after the deadline.

Importance: Very important
To access your tax rebate, please overview reference attached.

Best Regards,
Tax Refund Deparment
Internal Revenue Service
© 2014, All rights reserved
----------

The attachment IRS_EA75A0CF0A.zip, contains the malicious file report_346258749.565.pdf.exe.

The malicious file contains the follow threat when we scanned it for virus:

  • TR/Crypt.ZPACK.51833
  • Win32:Trojan-gen
  • Trojan.Win32.InfoStealer.aVIU
  • W32.RogueZapchastV.Trojan
  • Win32/PSW.Agent.NTM
  • W32/Injector.AYEB!tr
  • Trojan/Blocker.acix
  • Trojan-PSW.Win32.Tepfer.tgcp
  • Trojan.WinLock
  • Dropper-FJW!E77DDC29CCEF
  • PWS:Win32/Fareit
  • HEUR/Malware.QVM19.Gen
  • Troj/Zbot-HRL
  • TSPY_FAREIT.YUJ
  • Trojan.Win32.Zbot.355129

This email message was not sent by Internal Revenue Service (IRS), but by cybercriminals, whose aim is to trick the curious recipients into opening the malicious attachment that will infect their computers with a virus or Trojan horse.

Once your computer has become infected with this malicious Trojan horse, the cybercriminals behind this email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cybercrimes, or steal your personal and financial information.

Now, if you have already opened anyone of these malicious attachments, please do a full scan of your computer with the antivirus software installed on it. The name of the attachment may change, so be careful when opening email attachments. 

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

Never open an attachment that has a name ending with “.exe”, because these are computer programs that can infect your computer with a virus or some other malware.

Click here for a list of email attachments you should never open, regardless of where they came from.

For a list of other virus email messages, please click here.

These fake email messages are similar to the Dept of Labor Wage Notice email messages.

Please share with us what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward malicious or phishing email messages to us at the following email address: info@onlinethreatalerts.com .

Comments, Questions and Reviews

Comment(Total: 0)

Write a Comment, Review, or ask a Question or scroll down to view comments, reviews and questions made by others.

Would you recommend this article to a friend or family member?
Yes (1) No (0)   

Write Your Comment, Question or Review

Write your comment, question or review in the box below to share what you know or to get answers.
All comments, questions or reviews will be examined for derogatory or indecent statements, spam or malicous code, before they are posted on this website.


More for you:
Warning! JavaScript is turned off or disabled! Some features on this website will not work.