Na era digital de hoje, os golpistas estão constantemente encontrando novas maneiras de enganar indivíduos inocentes e roubar informações confidenciais. One common tactic used by cybercriminals is the “Incoming Mail Notification” email scam. Neste artigo, vamos nos aprofundar nos detalhes desse golpe, como funciona, and what steps you can take to protect yourself from falling victim to such fraudulent schemes.

The Deceptive Email

The “Incoming Mail Notification” scam email is designed to trick recipients into divulging their personal and sensitive information. It often uses a deceptive subject line, such as “Message Failure Delivery Notice,” to create a sense of urgency and concern. The email claims to be a message failure delivery notice from the “Mail Delivery Subsystem” associated with an email service provider.

Luring Recipients with False Claims

The content of the email attempts to lure recipients into believing that there are pending messages not delivered to their inbox. It attributes this issue to a supposed system delay, creating a sense of urgency for the recipient to take immediate action. To address the fabricated problem, the email prompts the recipient to click on a link, usually labeled as “Release To Inbox.”

Mimicking Legitimate Services

To appear trustworthy, the email asserts that it has been scanned and deemed safe. This is a common tactic used by phishing emails to manipulate users into interacting with deceptive content. Clicking on the link leads the user to a phishing website designed to mimic the appearance of the email service provider associated with the recipient’s email address.

Extracting Login Credentials

The purpose of this phishing page is to extract the recipient’s email account login credentials. Scammers use stolen login credentials to gain unauthorized access to the victim’s email account. Uma vez dentro, they can exploit the compromised account for various malicious activities, including information theft, unauthorized access to other linked accounts, and spreading phishing scams or malware to the victim’s contacts.

Potential Consequences

The consequences of falling victim to the “Incoming Mail Notification” scam can be severe. Scammers may use the stolen login credentials to access other accounts, including social media profiles, online banking accounts, e-commerce platforms, and various other online services. This can result in unauthorized online purchases, senhas de contas online alteradas, roubo de identidade, e acesso ilegal ao computador da vítima.

você verá sua imagem acompanhada por um triângulo vermelho e a inscrição “Sem comando”:

Tente o SpyHunter

SpyHunter é uma ferramenta poderosa que é capaz de manter seu Windows limpo. Ele procuraria e excluiria automaticamente todos os elementos relacionados a malware. Não é apenas a maneira mais fácil de eliminar malware, mas também a mais segura e segura. A versão completa do SpyHunter custa $42 (você começa com 6 meses de subscrição). Ao clicar no botão, você concorda com EULA e Política de Privacidade. O download começará automaticamente.

Baixar SpyHunter

para Windows

Experimente o SpyHunter para Mac

SpyHunter para Mac remove totalmente todas as instâncias dos vírus mais recentes do Mac / MacBook e Safari. Além disso, é mais eficaz e pode ajudar a otimizar o MacOS e liberar espaço no disco. Compatível com todas as versões do MacOS. A versão gratuita do SpyHunter para Mac permite que você, sujeita a um período de espera de 48 horas, uma correção e remoção para resultados encontrados. A versão completa do SpyHunter custa $42 (você começa com 6 meses de subscrição). Ao clicar no botão, você concorda com EULA e Política de Privacidade. O download começará automaticamente.

Baixe SpyHunter para Mac

versões MacOS

Tipos de e-mails maliciosos

The “Incoming Mail Notification” scam is just one example of the various types of malicious emails used by cybercriminals. Understanding these types can help you recognize and avoid falling victim to phishing scams. Here are some common types of malicious emails:

1. E-mails de phishing

Phishing emails are designed to trick users into divulging their sensitive private information, como credenciais de login para serviços online, contas de e-mail, ou informações bancárias on-line. These emails often use deceptive subject lines, urgency, and mimicry of legitimate services to manipulate users.

2. Emails com anexos maliciosos

Another popular attack vector is email spam with malicious attachments that infect users’ computers with malware. These attachments can carry trojans capable of stealing passwords, informação bancária, e outros dados confidenciais. Cybercriminals often use social engineering tactics to trick users into opening these infected attachments.

3. E-mails de sextorsão

Sextortion emails are a type of phishing scam where users receive an email claiming that a cybercriminal has compromising material, such as a video recording of the victim, obtained through their webcam. The scammers demand a ransom in exchange for not releasing the video. No entanto, essas afirmações geralmente são falsas, and users should ignore and delete such emails.

Como identificar um e-mail malicioso

Recognizing the signs of a malicious email is crucial in protecting yourself from falling victim to scams. Aqui estão algumas dicas para ajudá-lo a identificar um e-mail malicioso:

  1. Verifique o endereço de e-mail do remetente: Hover over the “from” address to verify its legitimacy. Scammers often use similar-looking addresses to deceive recipients.
  2. Procure saudações genéricas: Legitimate emails from reputable companies usually address recipients by their name. Generic greetings like “Dear user” or “Dear valued customer” may indicate a phishing attempt.
  3. Verifique os links antes de clicar: Hover over the links in the email to see where they lead. If they appear suspicious or do not match the expected destination, it’s best to avoid clicking on them.
  4. Tenha cuidado com anexos de e-mail: Be wary of unexpected attachments, especially those from unknown senders. Scan attachments with an antivirus program before opening them.

O que fazer se você cair em um golpe por e-mail

If you have fallen victim to an email scam, it’s essential to take immediate action to minimize the potential damage. Aqui estão algumas etapas que você pode seguir:

  1. Mude suas senhas: Se você forneceu suas credenciais de login para golpistas, change your passwords for all affected accounts as soon as possible. Use forte, unique passwords for each account.
  2. Monitore suas contas: Keep a close eye on your accounts for any unauthorized activity or irregularities. Report any suspicious transactions or changes to the respective service providers.
  3. Entre em contato com seu banco ou administradora de cartão de crédito: If you provided your credit card information, contact your bank or credit card company immediately to report the incident and potentially cancel your compromised card.
  4. Faça uma varredura em seu computador em busca de malware: If you opened any suspicious attachments, scan your computer with reputable antivirus software to detect and remove any malware that may have been installed.
  5. Denuncie o golpe: Help protect others by reporting the phishing email to relevant authorities, como o Grupo de Trabalho Anti-Phishing, Centro de reclamações de crimes na Internet do FBI, and your email service provider.

Ferramenta antispam recomendada:

Experimente o MailWasher

A segurança de e-mail é a primeira linha de defesa contra vírus ransomware. Para fazer isso, recomendamos que você use MailWasher. MailWasher bloqueia vírus de ransomware vindos de spam e phishing, e detecta automaticamente anexos e URLs maliciosos. Além do mais, mensagens maliciosas podem ser bloqueadas antes mesmo que o destinatário as abra. Uma vez que a principal fonte de propagação de vírus ransomware são e-mails infectados, o antispam reduz significativamente o risco de um vírus aparecer no seu computador.

Baixar Mail Washer

Conclusão

The “Incoming Mail Notification” email scam is a common tactic used by cybercriminals to deceive individuals and steal their sensitive information. By understanding how these scams operate and being vigilant when it comes to suspicious emails, you can protect yourself from falling victim to such fraudulent schemes. Remember to verify the authenticity of emails, avoid clicking on suspicious links or opening unknown attachments, and report any phishing attempts to the appropriate authorities. Stay informed and stay safe in the digital world.

Deixe uma resposta

seu endereço de e-mail não será publicado. Os campos obrigatórios estão marcados *