A new email scam detected by MailGuard today is exploiting Xero’s trademark to try and gain the trust of potential victims.
In the screenshot above you can see that these scam messages are meant to look like invoice notifications sent through the Xero accounting platform. The criminals who are operating this scam appear to have registered four new domains: xerocentral.com, xero-fx.com, xerogroup.org and xeromobile.net with a Chinese registrar yesterday.
Keep an eye out for these bogus Xero sender addresses:
The individual messages sent out in this attack bear various real business names, and these names have been used in the ‘subject’ fields of the email messages. Some examples of subject lines associated with this scam include:
The objective of this email is to get the recipient to click on a link that will direct them to a hidden JavaScript malware file.
Malware linked scams like this usually install viruses or spyware onto victims computers when they open innocent looking attachments or click on links. The ultimate intention of malware attacks of this sort is harvesting victims personal data to perpetrate identity theft or fraud.
Please share this scam warning with your social networks to help us warn people about this attack.
Cybercriminals use email scams to infiltrate organisations with malware and attack them from the inside.
All criminals need to break into your business is a cleverly worded message. If they can trick one person in your company into clicking on a malicious link they can gain access to your data.
For a few dollars per staff member per month, you can protect your business with MailGuard's predictive email security.
Talk to an expert at MailGuard today about making your company's network secure: click here.
Stay up-to-date with new posts on the MailGuard Blog by subscribing to free updates. Click on the button below: