Warning! JavaScript is turned off or disabled! Some features on this website will not work.
« »
»

Virus Email - "Copy of Claim Passed for Consideration to HM Courts Ref"

2015-05-08T09:43:37 -  +
Virus Email - "Copy of Claim Passed for Consideration to HM Courts Ref"

The email message below, which states that a claim has been issued against the recipients and passed for consideration to the HM Courts, is a fake and the attached Microsoft Word document contains a malicious Macro Script, that will download and infect the recipients' computers with viruses, Trojan horse and other malware, if they open it and enable Macro or "Content". There are multiple copies of the email message with different company or individual names.

Please continue reading below.

The Fake and Malicious Email Message

HM Courts & Tribunals Service

Subjects:

Copy of claim passed for consideration to HM Courts Ref:[EK8013GUH] from SOVEREIGN MINES OF AFRICA PLC
Copy of claim passed for consideration to HM Courts Ref:[UK1751MQV] from FALKLAND OIL & GAS
Copy of claim passed for consideration to HM Courts Ref:[EI6841DHZ] from BREEDON AGGREGATES LTD
Copy of claim passed for consideration to HM Courts Ref:[BB1620VDT] from WILLIAM HILL PLC
Copy of claim passed for consideration to HM Courts Ref:[FZ8349DFN] from GAZPROM OAO
Copy of claim passed for consideration to HM Courts Ref:[WY4077WQJ] from Hardy Amies Ltd
Copy of claim passed for consideration to HM Courts Ref:[GX0331SJB] from Nathaniel Lichfield and Partners
Copy of claim passed for consideration to HM Courts Ref:[IE3319PZC] from ACTION HOTELS PLC

SOVEREIGN MINES OF AFRICA PLC has issued the claim against you and passed for consideration to HM Courts Ref:[EK8013GUH].The claim was read, and passed to the second reading. For these or other notarial acts, or the legalising of documents, please contact SOVEREIGN MINES OF AFRICA PLC as soon as posible.

The malicious attached Microsoft Word document has a set of instructions called a Macro that will attempt to dowload viruses, Trojan horses and other malware.

The cybercriminals behind the malicious email message aim is to trick the curious recipients into opening the malicious attachment, which will infect their computers with a virus or Trojan horse.

Once their computers have become infected with a Trojan horse or some other malware, the cybercriminals behind this email message will be able to access and take control of their computers remotely from anywhere around the world. They may spy on them, use their computesr to commit cyber-crimes, or steal their personal and financial information.

Now, if you have already opened the malicious file, please do a full scan of your computer with the antivirus software installed on it.

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

Click here for a list of email attachments you should never open, regardless of where they came from.

For a list of other virus email messages, please click here.

Please share what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

Remember to help us, help you, by donating. 🎁Click here to donate

Please continue reading below.

Comments, Questions and Reviews ✍
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews.

Show More of the 0 Comments

Write Your Comment, Question or Review

Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.