Beware of ‘Doing Business With Your Company’ Email Scam
Table of Contents
Understanding the Deceptive Business Inquiry
The 'Doing Business With Your Company' email scam is a cunning phishing attempt disguised as a legitimate business inquiry. Scammers behind this email aim to deceive recipients by presenting a seemingly genuine offer for potential business collaboration. The email may claim to offer product samples and direct recipients to click on misleading links to view these samples. These links often prompt users to log in with their company email and password.
The Fake Login Page
Clicking on links like "View Our Sample" or "Download" in these fraudulent emails usually redirects recipients to a fake login page. This page is designed to steal the login credentials that have been entered. Once scammers obtain these credentials, they gain access to the victim's email account, where they can search for sensitive information, send further phishing emails, or even distribute malicious software to the victim's contacts.
Here's the email's text:
Subject: New_Order#SQ031776
Hello XXXXXXXX,
We are Interested in Doing Business with your company
Kindly log-in with your valid Company email and password to
view the samples of the product we want to purchase thanks.View Our Sample
New Order .xls
2 files
2 Specification & Sample
order.PDF 11 MB
Risks of Stolen Login Credentials
With stolen email credentials, cybercriminals can attempt to access other accounts, including social media and banking platforms. This can lead to identity theft, financial loss, and other severe issues. It is crucial to scrutinize suspicious emails thoroughly before providing any personal information or clicking on embedded links.
Common Tactics Used in Phishing Emails
Phishing emails like these often use urgent or enticing language to trick recipients into believing they have received important documents such as invoices, shipment notifications, or legal notices. The primary goal is to steal sensitive information, but these emails can also serve as a vector for distributing malicious software.
Similar Phishing Email Examples
Other examples of similar phishing emails include "We Updated Our Policy," "DHL - Notice For Failed Package Delivery," and "Email Is Due For Validation." These emails use various pretexts to lure recipients into clicking malicious links or opening dangerous attachments.
How Malware May Be Distributed via Email
Cybercriminals distribute malware through email by sending malicious files or links. Links in fraudulent emails can redirect users to websites that host malware, leading to unintended downloads of harmful files or programs. Sometimes, the websites automatically download malware onto the user's system without their knowledge.
Malicious Attachments in Emails
Fraudulent emails often contain attachments like MS Office and PDF documents, archives, executables, and JavaScript files. Opening these attachments can initiate the malware infection process. For example, enabling macros in compromised MS Office documents or running malicious executables can lead to severe security breaches.
Precautionary Measures Against Email Scams
To protect yourself from such scams:
- Do not trust unexpected emails from unknown senders, especially if they contain files or links.
- Always examine the content of emails carefully before taking any action.
- Download software only from reputable sources like official websites or app stores, and avoid using unreliable sources such as P2P networks or third-party downloaders.
Safe Browsing and Email Practices
Avoid interacting with links, buttons, pop-ups, and ads encountered on dubious websites. Do not allow these websites to send you notifications. Keep your operating system and all installed programs updated to minimize vulnerabilities. Additionally, installing a reputable security tool and regularly scanning your computer can help detect and prevent threats.
Final Thoughts
The 'Doing Business With Your Company' email scam highlights the importance of vigilance in the digital age. By understanding the tactics used by scammers and adopting proactive measures, you can protect your personal and financial information. Always verify the legitimacy of unsolicited emails before taking any action, and stay updated on the latest scam trends to safeguard against online threats.








