Did you receive a ransom demand or phishing mail from your own email account?
We have recently received many reports of emails posing as ransomware attacks with the aim of committing scams such as financial stings. In order to attract the attention of the attacked and also to encourage him to cooperate with them, the attackers use a method called Email Spoofing, forging the sender's email address.
What is Email Spoofing?
This is a technique used in phishing and spam attacks through which the attacker presents the attacker with a sender address that will make him think that the message came from a person he knows and can trust (or even from the attacker's own box).
Where is it mainly used?
One of the common ways to stress the potential victims is to send them an email allegedly from their own email address, so that they think the attacker has hacked and already gained access to their email.
For example, an email that presents the recipient with a ransom demand and in which the attacker states that he managed to gain access to the attacked email. When the address from which the e-mail was sent, will display the e-mail address of the attacked himself in the sender field, the credibility of the victim will be strengthened and it may even motivate him to take action.
What should you do if you received such an email?
1. It is recommended to delete these emails (also from the deleted messages box) and ignore them completely.
2. Run a full virus scan on your computer and mobile phone which will help ensure there is no malware on these devices.
3. Update a new, strong and secure email password.
4. Cultivate awareness - know the threats and methods of action of attackers to scare you. In general, phishing emails are nothing new and we see them every day.
5. Whatever security challenge you may be facing, our team of experts can help. So you can contact us at: contact@ntrigo.com
RedFox safeguards your devices, your data, and your privacy with protection that’s relentless but lightweight and easy to use.