W dniu 20.09.2020 o 17:00, Tony Brown pisze:
Please be advised:

My email account was hacked while I was on vacation last week.  Generated from my email address were two 
variations of emails with subjects of "Proof of Payment" or "Receipt of Payment" each 
containing an "html" attachment.  If you receive either of these emails, please delete without 
opening the attachment.

Apparently, there are a number of variations of this "hack" being circulated with some type of 
reference to "payment" and/or "invoice"; please be cautious with any similar emails that 
you receive.

Regards,

Tony
--
Tony Brown
Software Development
Dino-Software Corporation



How can we believe the message sent by unknown person?
Note: this email account was hacked, so there is no warranty who is the sender.
<vbg>

But seriously:
1. Anyone can put any name in the "sender" field. There are even free web services for kiddies who want to be "hackers". However hacked (hijacked) email account means access to address database. I do not expect any email from Tony, however Tony's customer or his brother will not be surprised by email from Tony. 2. Attachments can be dangerous ...or not. It strongly depend on what do you do with the attachment and if you are using Windows or not. For non-Windows OS (read: Linux) vast majority of malware will not work. Very popular malicious PDF attachments are not malicious when opened by some freeware viewers. For doubtful cases one may use isolated virtual machine and delete/refresh it just after use. Of course the simplest method is to delete it. 3. Puzzle: why Nigerian scam emails are so horribly written? I mean a lot of language mistakes. The answer is this is intentional. This is a method to filter out bright people and leave only the fools. Only fool people are good candidates to further steps of scam, which are expensive because that require manwork. Conclusion: answering to every scam by clever volunteers would blow up this trick. Hackers would be unable to manually cheat everyone, with only very small percentage of potential victims. ;-)

--
Radoslaw Skorupka
Lodz, Poland





======================================================================

Jeśli nie jesteś adresatem tej wiadomości:

- powiadom nas o tym w mailu zwrotnym (dziękujemy!),
- usuń trwale tę wiadomość (i wszystkie kopie, które wydrukowałeś lub zapisałeś 
na dysku).
Wiadomość ta może zawierać chronione prawem informacje, które może wykorzystać 
tylko adresat.Przypominamy, że każdy, kto rozpowszechnia (kopiuje, rozprowadza) 
tę wiadomość lub podejmuje podobne działania, narusza prawo i może podlegać 
karze.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: [email protected]. Sąd Rejonowy dla m. st. 
Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, KRS 0000025237, 
NIP: 526-021-50-88. Kapitał zakładowy (opłacony w całości) według stanu na 
01.01.2020 r. wynosi 169.401.468 złotych.

If you are not the addressee of this message:

- let us know by replying to this e-mail (thank you!),
- delete this message permanently (including all the copies which you have 
printed out or saved).
This message may contain legally protected information, which may be used 
exclusively by the addressee.Please be reminded that anyone who disseminates 
(copies, distributes) this message or takes any similar action, violates the 
law and may be penalised.

mBank S.A. with its registered office in Warsaw, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: [email protected]. District Court for the Capital 
City of Warsaw, 12th Commercial Division of the National Court Register, KRS 
0000025237, NIP: 526-021-50-88. Fully paid-up share capital amounting to PLN 
169.401.468 as at 1 January 2020.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to