<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Document Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/document/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/document/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 30 Mar 2017 15:52:45 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Document Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/document/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Evil e-mail has your name and address!</title>
		<link>https://www.l2cybersecurity.com/evil-e-mail-knows-you/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 30 Mar 2017 15:52:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=602</guid>

					<description><![CDATA[<p>Reports today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://nakedsecurity.sophos.com/2017/03/30/the-scam-that-knows-your-name-and-home-address-heres-what-to-do/">Reports</a> today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll bet if you got this e-mail, it would get your attention pretty fast.</p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-604 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png" alt="" width="400" height="209" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21.png 640w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img decoding="async" class="wp-image-605 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png" alt="" width="401" height="243" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11.png 640w" sizes="(max-width: 401px) 100vw, 401px" /></p>
<p><span id="more-602"></span></p>
<p>Even though it is written in the scam-iest possible language with the bad spelling and poor English, because it is addressed direct to you, you are going to sit up and take notice. So much so, that you might be very tempted to open the attachment to see what other information this person has on you. You should know me by now &#8211; Just DON&#8217;T open the attachment on an e-mail from a stranger &#8211; delete the damned thing, as set out in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>If you did open it, it will ask for the password, which is specified in the evil e-mail:</p>
<p><img decoding="async" class="wp-image-606 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png" alt="evil e-mail asks for password" width="401" height="238" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password.png 637w" sizes="(max-width: 401px) 100vw, 401px" /></p>
<p>And after you enter that, it will want you to disable all of the security protections in Microsoft Word, so it can attempt to do it&#8217;s nasty work on your desktop/laptop:</p>
<p><img loading="lazy" decoding="async" class="wp-image-607 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png" alt="evil e-mail asks to disable security" width="400" height="346" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected.png 636w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>If you follow through and do what it asks you to do, you wont see any further information about you, you will see an &#8220;alternative fact&#8221; &#8211; It will tell you the file is corrupted and can&#8217;t be opened:</p>
<p><img loading="lazy" decoding="async" class="wp-image-608 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png" alt="evil e-mail shows corrupted message" width="401" height="234" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>In fact this is a sign that the evil e-mail has done it&#8217;s worst and may be scrambling your files and locking you out of them. The payload can vary, depending on what the evil doers decide they want to achieve. Trust me on this, it will not be anything in your best interests.</p>
<p>So please, JUST DON&#8217;T do anything with the e-mail! Delete the damned thing and go on with your life.</p>
<p>The fact that they have your name and address, while concerning is maybe not terribly surprising. After all in 2016, there was <em><strong>at least</strong></em> <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2016-1-6-billion-records-leaked/">3.1 billion records reported</a> as being leaked in various data breaches. So it is possible that your name, address and e-mail have made it into the hands of the criminals who are now trying to exploit the data in this nasty phishing scam.</p>
<p>Delete the e-mail and move on.</p>
<p>And let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
