Email Delivery Status Notification Scam
Phishing remains one of the most common and dangerous cybercrime tactics, and the Email Delivery Status Notification Scam is a perfect example of how attackers manipulate trust. These fraudulent emails are disguised as delivery notifications from email service providers, claiming that messages could not be delivered to the recipient’s inbox.
It is important to stress that these messages are not connected to any legitimate companies, organizations, or service providers. Instead, they are part of a malicious campaign designed to steal sensitive information.
Table of Contents
How the Scam Works
Victims receive an email that looks like a professional notification about undelivered messages. The email falsely states that the issue is due to problems with domain DNS records or authentication mechanisms like SPF, DKIM, or DMARC.
To resolve the supposed problem, recipients are urged to click a button or link that supposedly grants access to their email portal. However, this link leads to a fraudulent webmail login page, created solely to capture login credentials such as email addresses and passwords.
The Dangers of Compromised Accounts
Once scammers obtain login details, they can do far more than just access email inboxes. A hijacked account may be exploited to:
- Harvest personal or business information stored in the mailbox.
- Distribute more phishing emails to contacts, further spreading the scam.
- Deliver malware through malicious attachments or links.
- Attempt to access other accounts linked to the same email, such as social media, online banking, or cloud services.
In many cases, the stolen information is also sold to other cybercriminals, increasing the victim’s exposure to future attacks.
Common Phishing Tactics to Watch For
Cybercriminals frequently impersonate trusted entities to create a false sense of urgency and legitimacy. In scams like the Email Delivery Status Notification scheme, they use deceptive links and attachments to steal sensitive data or infect devices with malware.
Warning signs include:
- Unexpected delivery failure notifications without any prior issue.
- Requests to 'log in' through an unfamiliar portal or third-party site.
- Poor grammar, formatting inconsistencies, or slightly altered domain names.
- Urgent instructions suggesting accounts will be suspended or blocked.
The Malware Connection
Beyond credential theft, email remains a preferred method for malware delivery. Malicious attachments often come disguised as:
- Word or Excel files that request macros to be enabled.
- PDFs that redirect to unsafe websites.
- Executables or compressed archives (ZIP, RAR) that contain hidden payloads.
Clicking embedded links can also redirect users to compromised websites that automatically install malware or trick them into downloading it manually. Once installed, such malware can record keystrokes, steal stored credentials, encrypt files for ransom, or allow remote access to the system.
Final Thoughts
The Email Delivery Status Notification Scam is a sophisticated phishing attempt designed to steal credentials and potentially deliver malware. By learning to recognize the signs of phishing and resisting the urge to click on suspicious links or attachments, users can greatly reduce their risk.
Always remember: legitimate service providers will never pressure you to log in through unexpected links or third-party portals.