The Fake and Malicious Email Messages
Thank you for purchasing with us now! Your order is now on process.
Purchase Number: DTD472728214
Order Date: 11:34 Tue, Sep 30, 2014
Purchaser Email: <email address removed>
Order Total: 4656 US Dollars
Download your invoice
Please hit the link given at the top to have more info about your order.
Thanks for placing order with us to day! Your order is currently processing.
BILLING INFOR MATION
Order Nu mber: ESC491547171
Purchase Date: 9:27 Thursday, Oct 2, 2014
Amount: 6249 USD
View an order file
Please visit the link given at the top to have more information about this issue.
Thank you for placing order with us now! Your order is currently processing.
Purchase Number: NXV016781849
Order Date: 11.09 October 2, 2014
Outright Purchase: 5711 US Dollars
Please click the link given above to get more info about this issue.
If the recipients click on the malicious link in the email messages, they will be taken to the following website address or location, where they will be asked to download the malicious file: Order _X7141.zip:
- https://www.dropbox.com/ s/ntt72pfdr2kvh4b/Order _X7141.zip?dl=1
Note: the cyber-criminals behind this malicious email message may use a different web address or change the name of the file.
The file Order _X7141.zip contains a virus or a Trojan horse.
Now, if you have already clicked on the link in the malicious email message, downloaded and opened the malicious file, please do a full scan of your computer with the antivirus software installed on it.
Because, once your computer has become infected with the malicious Trojan horse, the cybercriminals behind the email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cybercrimes, or steal your personal and financial information.
If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.
For a list of other malicious email messages, please click here.