Alleged invoice emails from well-known companies are increasingly being used to distribute malware.
How the fraud works:
The Trojans (derived from the term “Trojan horse”) disguise themselves as a useful program but run damaging programs in the background, so-called malware. A practical example: A well-known company sends alleged invoice emails to potential victims. This email typically portrays an alarming scenario. The reader is told they will find the reason for a high invoice amount via a link in the attachment. This is intended to induce the recipient to click on the link or open the attachment. As soon as they do so, the malware is installed on their computer.
How can you protect yourself in this case?
- Do not let yourself be caught unawares and do not open any attachments or links in email of dubious origin.
- Be careful with add-ins/plug-ins from unknown producers.
- Regularly update your software and operating systems.
- Set your operating systems so your emails are always checked.
- Regularly scan all the drives on your computer for malware.
- Use a firewall that monitors network traffic.
- Use virus protection software and keep it up-to-date. Set your operating systems so your emails are always checked.