Your Amazon.com Order - Virus Email Message
June 4, 2014
December 13, 2013
The fake email message below with the subject: "Your Amazon.com order," contains a very dangerous computer program called a Trojan horse. So, please do not open the attachment for this email message if you receive a copy of it.
Please continue reading below.
The 'Your Amazon.com Order' Virus Email Message
Subject: Your Amazon.com order SD0272242
From: Support (SupportAmazonIDbokdkgvo @amazonSupportidhxeg.com)
Sent: Fri 12/13/13 9:33 AM
Thank you for your order. We’ll let you know once your item(s) have dispatched.You can view the status of your order or make changes to it by visiting Your Orders on Amazon.com.
Order PK4404360 Placed on December 9, 2013
Order details and invoice in attached file.
Need to make changes to your order? Visit our Help page for more information and video guides.
We hope to see you again soon. Amazon.com
The following threats were detected after scanning the attachment:
This email message tries to trick the recipient into opening the malicious attachment, by claiming that the recipient can view his/her Amazon.com order status by opening the attachment.
If your computer is infected with this malicious computer program (Trojan horse), it can be used to spy on you, steal your personal/financial information, or allow cybercriminals to take control of your computer remotely. With remote access to your computer, these criminals can use your computer to commit cybercrimes, which will be traced back to you.
Now, if you have already opened this malicious attachment (ORDER_Ni78282.zip), please do a full scan of your computer with the antivirus software installed on it.
If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.
Please share with us what you know or ask a question about this article, by leaving a comment below. And, forward malicious email messages to us using the following email address: email@example.com .
Alert and help your family and friends by sharing this article with them: