• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Crime
Scams and Fraud

“Child Predator Alert”: A Fake Email Leading to Malware

February 28th, 2015 Waqas Cyber Crime, Scams and Fraud, Security 0 comments
“Child Predator Alert”: A Fake Email Leading to Malware
Share on FacebookShare on Twitter

Parents nowadays must be receiving an email alert that claims “a child predator has moved to your neighborhood.”

As per the content of this email, parents are informed that a child predator has moved into their neighborhood recently.

The recipient is asked to click on a link to receive more information about the predator.

The email appears to be an “automated local community alert,” claiming that the warning has been issued due to the recipient’s IP address and zip code.

However, in reality there is no such warning issued by concerned authorities and this is a bogus email.

The offered link doesn’t provide information about the person but leads to a page that contains malware.

The website that the user gets redirected to is a fake or compromised one.

As soon as the user visits the link, a malware gets downloaded and installed on the computer system.

The purpose of installing this malware is to harvest critically important personal information like user ID and password of the infected device.

The information is instantly received by cyber criminals waiting online.

Not just this, the malware also encourages installation of several other malware. In this way, hackers can fully control the infected device.

Screenshot of phishing email:

child-predator-alert-a-fake-email-leading-to-malware

Users, after downloading, are taken to a genuine website offering news and reports on sex offenders. However, this website has got nothing to do with the malware attack.

The fake emails were firstly reported in November 2014 and according to recent data, these fake emails are being distributed again since January 2015.

Important Note:

The dates, subject message and the actual content of this email may vary so you need to be cautious. Never click or open any of the attachments that such bogus emails contain.

Follow @HackRead

  • Tags
  • Email
  • Fraud
  • hacking
  • Malware
  • Phishing
  • Privacy
  • Scam
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Police use Facebook to find person who dropped bag of cocaine
Next article US Police Dept Pays Crypto-Malware Ransom to retrieve sensitive records
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

59
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

93
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

111

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us