Skip to content

Fraudulent e‑mails

What are fraudulent e‑mails ?

Fraud­u­lent e‑mails are e‑mails which can con­tain infec­tious attach­ments: Pay atten­tion to these fraud­u­lent e‑mails because a sin­gle entry point is enough to infil­trate a net­work!

The aim of a trap and thus mali­cious attach­ment is to pose as a legit­i­mate file (PDF, Word doc­u­ment, JPG image…), while host­ing and hid­ing a mali­cious code: this is what we gen­er­al­ly call Tro­jans.

These fraud­u­lent e‑mails can serve to ran­somware attacks.

How to protect against fraudulent e‑mails?

The vig­i­lance is cru­cial.

  • Don’t open e‑mails of sus­pi­cious ori­gin;
  • Don’t ever open an attach­ment from an unknown sender or from one who is not entire­ly trust­wor­thy;
  • Check the links by hov­er­ing the cur­sor over them (with­out click­ing) to ensure that they link to trust­wor­thy web­sites;
  • Nev­er reply under the pres­sure of this kind of solic­i­ta­tion and do not pro­ceed to any pay­ment;
  • If there is any doubt, con­tact the sender through anoth­er method, they will con­firm if it real­ly is a fraud attempt or not;
  • Be atten­tive of the qual­i­ty of the lan­guage used by the mail’s sender.

Please find recent cas­es of fraud­u­lent emails on the blog.