Important information about phishing emails using the name

We have received a significant number of phishing reports from our customers. They are receiving malicious emails that impersonate our services and try to steal sensitive information.

This is an example of a reported phishing email:

Phishing email example

If you received this or similar emails, please do not click on any of the links, remove it and let us know.

How to detect a phishing attack?

Although we maintain controls to protect our networks and systems from cyber threats, we have no control over what fraudsters send to customers’ personal mailboxes that are not hosted on our servers.

In an effort to protect our customers, we want to highlight a common cyber attack that everyone should be aware of: phishing.

Phishing is the most common type of cyber attack affecting organizations and individuals around the world. Phishing attacks can take many forms, but they all share a common goal: getting you to share sensitive information like login credentials, credit card information, or bank account details.

Types of phishing attacks to watch out for

  • Phishing: In this type of attack, hackers pose as a real company to obtain your login credentials. You may receive an email asking you to verify your account details with a link that takes you to an impostor login screen that delivers your information directly to attackers.
  • Spear Phishing: Spear phishing is a more sophisticated phishing attack that includes personalized information that makes the attacker appear to be a legitimate source. They may use your name and phone number and refer to a specific company in the email to trick you into thinking they have a connection to you, making you more likely to click on a link or attachment they provide .
  • Shared Document Phishing: You may receive an email that appears to come from file-sharing sites like Dropbox or Google Drive notifying you that a document has been shared with you. The link provided in these emails will take you to a fake login page that mimics the real login page and steals your account credentials.
See also  How to create a free web page? - Explanatory video

What you can do

To avoid these phishing schemes, observe the following email best practices:

  • Don’t click on links or attachments from senders you don’t recognize. Be especially careful with .zip files or other types of compressed or executable files.
  • Do not provide sensitive personal information (such as usernames and passwords) by email.
  • Be on the lookout for email senders using suspicious or misleading domain names.
  • Inspect URLs carefully to make sure they are legitimate sites and not imposters.
  • Don’t try to open any shared document that you don’t expect to receive.
  • If you can’t tell if an email is legitimate or not, contact the company’s support directly through the chat or contacts provided on their website. Never use the contacts provided in the email.
  • Be especially careful when opening attachments or clicking on links if you receive an email that contains a warning banner indicating it originated from an external source.
  • Enable 2FA authentication on your accounts when possible.

If you’ve opened an email, but haven’t clicked on anything, don’t worry.
Contact customer service via If you have any question.

Stefany is a marketing professional, lover of good grammar. She enjoys writing about technology and SEO. In her free time, she likes to watch movies and make cookies.

Loading Facebook Comments ...
Loading Disqus Comments ...