Email with the subject line ‘Payment Accepted’ claims to be from a financial manager and requests that you check a payment confirmation by opening an attached file.
Subject: FW: Payment ACCEPTED M-362827
This email informs you that your payment has been accepted, although it does not bother to mention which payment it is referring to or what company is doing the accepting. The subject line of the email simply states ‘Payment accepted’ along with an apparent reference number. The body of the message asks that you open an attached file to check a payment confirmation.
The email claims to be from a Financial Manager.
Once installed, Locky will encrypt the files stored on your computer and rename them all with the file extension .locky. It will then display a ‘ransom note’ that demands that you pay a fee to cybercriminals via the dark web in order to get a decryption key that will unlock your files. The message will ask that you pay the fee in the online currency Bitcoin.
Alas, unless you have recent back ups, there is no easy way to recover your files once they have been encrypted by the Locky malware. If you give in to the demands and pay the ransom, you MAY receive the promised encryption key. However, you will be dealing with anonymous criminals who will retreat back into the shadows once they have their money. So, there is no guarantee that you will receive a working decryption key even if you pay up.
Details, such as the reference number, the attachment name, and the name and job description of the staff member who supposedly sent the email may vary in different versions. Similar emails that also carry Locky may claim that a payment has been declined or that the sender has received documents from your bank.
If you receive one of these emails, do not click any links or open any attachments that it contains.
Last updated: March 17, 2016
First published: March 17, 2016
By Brett M. Christensen
Importance NoticeAfter considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.
These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.
Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.
And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.
When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.
I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.
A Big Thank YouI would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.
I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.
Closing DateHoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.
Thank you, one and all!