BVN (Braunston Village news)Braunston Village Hall - Hiring and InformationBraunston Village Charity

Braunston Parish Council News

Do Not Reply’ Phishin Campaign 7 Dec 2016 ‘Do Not Reply’ Phishin Campaign And Malware Alert 07/12/2016

This is a message sent via Northamptonshire Community Connect. This information has been sent on behalf of Northamptonshire Police Community Connect
(Please do not reply or forward this email directly; please use the Reply, Share buttons at the bottom of this message)
Message sent by
Suzie Fletcher (Police, Crime Prevention, FHQ)


The information contained within this alert is based on information from various sources. The purpose of this alert is to increase awareness of the mass phishing campaign currently in circulation. The campaign’s primary function appears to be distributing well-known malware, through an email attachment believed to be malicious. 
 
The alert is aimed at members of the public, local police forces, businesses and governmental agencies. 
 
Alert
 
Fraudsters are sending out a high number of phishing emails to personal and business email addresses pretending to come from ‘donotreply’ followed by the victims’ own email extension (for example [email protected]). 
 
The subject line currently is shown as a series of random numbers and letters; ‘RNP0024D5D73B3A’ and ‘KMBT_C220’ have both been seen. The emails include an attachment – a .zip file, usually with the current date followed by random digits in the file name. 
 
These attachments typically contain a password stealing component, with the aim of stealing your bank, PayPal or other financial details along with your email or FTP (web space) log in credentials. Many of them are also designed to specifically steal your Facebook and other social network log in details. 
 
Similarly, a very high proportion also contain Locky ransomware, that once downloaded will encrypt files and demand money (typically about £350) to recover the files. 
 
Protection/Prevention Advice
 
Having up-to-date virus protection is essential; however it will not always prevent you from becoming infected. 
 
Please consider the following actions: 
 
 

Don’t click on links or open any attachments you receive in unsolicited emails or SMS messages. Remember that fraudsters can ‘spoof’ an email address to make it look like one used by someone you trust. If you are unsure, check the email header to identify the true source of communication.
Always install software updates as soon as they become available. Whether you are updating the operating system or an application, the update will often include fixes for critical security vulnerabilities.
Create regular backups of your important files to an external hard drive, memory stick or online storage provider. It’s important that the device you back up to is not left connected to your computer as any malware infection could spread to that too.
Don't pay extortion demands as this only feeds into criminals' hands, and there is no guarantee that access to your files will be restored if you do pay.
If you think your bank details have been compromised, you should immediately contact your bank.
If you have been affected by this, or any other scam, report it to Action Fraud by calling 0300 123 2040, or visiting www.actionfraud.police.uk.

Please use the buttons below or click these links to Reply to, Rate or Forward this message. Do not reply or forward using your standard email functions.