This email supposedly contains an attached copy of your payment summary for the 2014/15 financial year.
It is apparently aimed at people working in the health sector and claims to be from Recruitment and Employee Transactional Services at HealthShare NSW. It includes links to HealthShare NSW and to the Australian Taxation Office (ATO).
However, the email is not legitimate and the attached file does not contain a payment summary.
Instead, the attached .zip file contains a malicious executable file that, if opened, can install malware on your computer. The exact type of malware payload may vary. Typically, however, such malware can download further malware components, steal sensitive information, and allow criminals to access and control the infected computer.
The email capitalises on the fact that many Australians may currently be in the process of preparing their tax returns. Thus, recipients, especially if they are busy or distracted, may open the attached file without due caution.
If you receive one of these emails, do not click any links or open any attachments that it contains.
Please find attached a copy of your 2014/15 Payment Summary (Group Certificate).
Note: You will receive a separate payment summary for each Health Agency you worked for during the 2014/15 financial year. Payment Summaries are also available in Employee Self Service.
Further information, including fact sheets: http://www.healthshare.nsw.gov.au/paymentsummaries
For taxation advice and information, visit www.ato.gov.au
Recruitment and Employee Transactional Services
This message is intended for the addressee named and may contain confidential information. If you are not the intended recipient, please delete it and notify the sender.
Views expressed in this message are those of the individual sender, and are not necessarily the views of NSW Health or any of its entities.
Attached .zip file: PAYG-EoY-2014-15-81024295-487883705.zip Contains: EoY-2014-15-04831806-000718002.scr
Importance NoticeAfter considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.
These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.
Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.
And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.
When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.
I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.
A Big Thank YouI would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.
I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.
Closing DateHoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.
Thank you, one and all!