Home Malware ‘Employee Documents – Internal Use’ Email Points to Malware

‘Employee Documents – Internal Use’ Email Points to Malware

by Brett M. Christensen

Employee Documents Malware Email

Sometimes, even simple tricks can be quite effective. In this case, criminals intent on distributing malware are using an email that claims to contain employee documents for internal use.  The email contains some rudimentary information about the supposed employee documents and includes a link that downloads the document from where it is stored online.

Tired or busy office workers may think that the message is just one more internal email that they need to deal with and click the link without due forethought.

But, if they do click the link, a zip file will be automatically downloaded to their computer. The zip harbours a malicious .scr file that, if opened, can install malware on Windows based computers. Once installed, the malware may download other types of malware and log sensitive information such as account usernames and passwords from the infected computer. It can then relay this stolen information to online criminals and allow the criminals to access and control the infected computer.

Versions of this malware email have been hitting inboxes since late 2014.  If you receive one, do not click any links or open any attachments that it contains.


Subject: Employee Documents – Internal Use

DOCUMENT NOTIFICATION, Powered by NetDocuments

DOCUMENT NAME: Employee Documents

DOCUMENT LINK: [Link removed]

Documents are encrypted in transit and store in a secure repository

This message may contain information that is privileged and confidential. If you received this transmission in error, please notify the sender by reply email and delete the message and any attachments.

Last updated: November 13, 2015
First published: November 13, 2015
By Brett M. Christensen
About Hoax-Slayer

Email “Employee Documents – Internal Use” Malware
Malware Threat Articles


Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,