Word Malware on red danger sign
Home Malware ‘Website Customer Invoice’ Malware Email

‘Website Customer Invoice’ Malware Email

by Brett M. Christensen

Keep in eye out for a malicious email that supposedly contains a website customer invoice.  The email, which has the subject “INVOICE [random numbers] Website customer”, claims that you can click a link to access the invoice in Microsoft Word (doc) format.

To make the email seem a little more professional, it includes a confidentiality clause like those that often appear in genuine business messages.

Email Does Not Contain an Invoice – Links to JavaScript Malware

However, the email is not a genuine invoice notification.  Clicking the link downloads a malicious JavaScript file that, if opened, can download and install further malware.

JavaScript malware is often used to install ransomware. Once installed, ransomware can lock all of your computer’s files and then demand that you pay a fee to online criminals to receive a decryption key.

Malicious JavaScript is also used to install malware that can steal banking login credentials and other personal information from the infected computer.

The malware email does not specify what product the invoice is supposedly for or what company supposedly sent it. This vagueness is a deliberate ploy to trick people into clicking out of curiosity or concern.

An example of the malware email:

Subject: INVOICE # 680102-59544 Website customer

Your report is attached in DOC format.
Attachments: http://{link removed]17-20-07/Invoice-4308023-5051/Website customer

Thank you for your time and consideration, have a pleasant day.
________________________________
This e-mail including any attachments is confidential, may be legally privileged and is designated exclusively for the intended recipient. Access by any other person is not authorised. Any disclosure of this e-mail or of names of persons mentioned therein as well as any storing, copying, distribution and dissemination is strictly prohibited.

If you are not the intended recipient, please immediately delete this e-mail and notify the sender by phone or by e-mail.



Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,
Hoax-Slayer