The Fake and Malicious Email Message
Thank you for your order. Please find attached a DOC copy of your invoice IN278577 from sales order S391622.
Your order was despatched on 21/05/2015. Please check the order on delivery and report any shortage, damage or discrepancy within 48 hours from of receipt of this invoice.
If you would prefer to receive a paper invoice or if this email has been sent to the wrong address, please email firstname.lastname@example.org or call our Customer Service Team on 017683 72939.
Tel: 017683 72939
Please consider the environment before printing this email
Out of Eden Ltd
The UK’s Most Popular One-Stop-Shop for Hospitality Products
Home Farm Buildings, Kirkby Stephen. CA17 4AP
Tel: 01768 372 939 Fax: 01768 372 636
VAT no: 621 2326 86
Reg.in England & Wales – Co. No. 3178081
The malicious attached Microsoft Word document has a set of instructions called a Macro that will attempt to dowload viruses, Trojan horses and other malware.
The cybercriminals behind the malicious email message aim is to trick the curious recipients into opening the malicious attachment, which will infect their computers with a virus or Trojan horse.
Once their computers have become infected with a Trojan horse or some other malware, the cybercriminals behind this email message will be able to access and take control of their computers remotely from anywhere around the world. They may spy on them, use their computesr to commit cyber-crimes, or steal their personal and financial information.
Now, if you have already opened the malicious file, please do a full scan of your computer with the antivirus software installed on it.
If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.
Click here for a list of email attachments you should never open, regardless of where they came from.
For a list of other virus email messages, please click here.
Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews. NB: We will use your IP address to display your approximate location to other users when you make a post. That location is not enough to find you.
Your comment, answer, or review will be set as anonymous because you are not signed in. An anonymous comment, answer, or review cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.
Write Your Comment, Question, Answer, or Review