Warning! JavaScript is turned off or disabled! Some features on this website will not work.
»

Fake and Virus Email Messages - "ISIS Attacks in Sydney in 2015"

2015-01-13T04:51:03 -  +
Fake and Virus Email Messages - "ISIS Attacks in Sydney in 2015"

Cyber-criminals are sending out fake email messages with the subject: "ISIS Attacks in Sydney 2015," that have a virus or malicious attachment that will infect the recipients’ computers if they attempt to open it. The fake emails will attempt to trick the recipients into opening the malicious attachment by claiming that it contains a news article naming the Sydney locations where ISIS plans to attack in 2015.

Please continue below.

The Fake and Virus Email Message

Subject: ISIS attacks in sydney?

ISIS has warned Australian Police today about new attacks in Sydney.

Attached the places in word file which ISIS planning to attack in Sydney this year 2015.

These terrorists have Australian Citizen why they attack us?

Read more in the detailed story in word file.

Please address any correspondence to:

[news address removed]

The switchboard number for [news] is:

[news phone number removed]

Telephone: [news phone number removed]

Email: [news email inserted removed]

The email is a hoax created by cyber-criminals to trick the recipients into opening the malicious attachment. The Australian Police said they have not received any warnings about new attacks in Sydney from the terrorist group ISIS.

The cyber-criminals behind the email message have included the contact information (removed by us) for popular and legitimate news website news.com.au, to make the email messages appear as if they are legitimate or came from a reputable news source.

If you have received the abovementioned email or other similar email messages, please do not attempt to open the attachment. The attachment does not contain a news article; instead it has a malicious Microsoft Word document or Zip/Compressed file that will infect your computer, if you attempt to open it.

Now, if you open or attempt to the open the malicious attachment, your computer will become infected with a virus or Trojan horse. Once your computer has become infected with the malicious virus or Trojan horse, the cyber-criminals behind the email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cybercrimes, or steal your personal and financial information.

Now, if you have already opened clicked on the link, downloaded and open the malicious file, please do a full scan of your computer with the antivirus software installed on it.

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

Click here for a list of email attachments you should never open, regardless of where they came from.

For a list of other virus email messages, please click here.

Please share with us what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

Comments, Questions and Reviews
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews.

Show More of the 0 Comments

Write Your Comment, Question or Review

Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.