Keep up to date with everything IIB, sign up to our mailing list

Thank you for signing up to our mailing list.

Please fill out all required fields

First Name

Last Name

Email

Fax

Be careful of phishing emails

Back to all news

Fraudsters are sending out a high volume of phishing emails to personal and business email addresses, pretending to come from various email addresses, which have been compromised.   

The subject line contains the recipient’s name, and the main body of text is usually:

“Hi, [name]!   I am disturbing you for a very serious reason. Although we are not familiar, but I have significant amount of individual info concerning you. The thing is that, most likely mistakenly, the data of your account has been emailed to me.   For instance, your address is:   [real home address]   I am a law–abiding citizen, so I decided to personal data may have been hacked. I attached the file – [surname].dot that I received, that you could explore what info has become obtainable for scammers. File password is – 2811   Best Wishes,”   

The emails include an attachment – a ‘.dot’ file usually titled with the recipient’s name.

Having up–to–date virus protection is essential; however it will not always prevent your device(s) from becoming infected.

Consider the following actions to help prevent being on the receiving end of a scam: 

  • Don’t click on links or open any attachments you receive in unsolicited emails or SMS messages: Remember that fraudsters can ‘spoof’ an email address to make it look like one used by someone you trust. If you are unsure, check the email header to identify the true source of communication (you can find out how by searching the internet for relevant advice for your email provider).
  • Do not enable macros in downloads; enabling macros will allow Trojan/malware to be installed onto your device.
  • Always install software updates as soon as they become available. Whether you are updating the operating system or an application, the update will often include fixes for critical security vulnerabilities.
  • Create regular backups of your important files to an external hard drive, memory stick or online storage provider. It is important that the device you back up to is not connected to your computer as any malware infection could spread to that as well.
  • If you think your bank details have been compromised, you should contact your bank immediately.