Threat Database Phishing 'Request To Delete Your Email' Scam

'Request To Delete Your Email' Scam

Upon examining the 'Request To Delete Your Email' letter, researchers confirmed that it is a spam email disseminated as part of a phishing tactic. This email type usually aims to deceive the recipient into believing that their email account is about to be terminated. However, this claim is untrue and is solely intended to generate a sense of urgency and panic in the recipient.

The main goal of this spam email is to trick the receiver into accessing a link that leads to a fraudulent website. This website, which is promoted by the spam email, is crafted to look like a legitimate website of a well-known email service provider. The website operates as a phishing site, which means that it seeks to obtain the recipient's account login credentials. Once the fraudsters have received the users' information, they could use it for various fraudulent purposes, such as identity theft or financial fraud.

Falling for Phishing Tactics Like the 'Request To Delete Your Email' Could Have Severe Consequences

The phishing emails part of this tactic are likely to have a subject line similar to 'Web Server Cancellation Request Received.' The emails inform recipients that a request to delete their email account has been received. If users don't take any action, their accounts will supposedly be terminated within 48 hours. According to the emails, if they want to stop the process, users will need to click on the 'Cancel Request' button immediately.

To create a sense of legitimacy, the 'Request To Delete Your Email' scam messages are signed off with 'Microsoft Corporation.' However, they are not associated with Microsoft or any other legitimate entities.

Victims of the 'Request To Delete Your Email' Scam are Taken to a Phishing Website

Following the link in the misleading email takes users to a phishing website disguised as an email account sign-in page. This dubious site is designed to trick visitors into entering their login credentials, including their email address and corresponding password. Once the con artists obtain this information, they can use it for various fraudulent purposes, such as collecting the contents of the email account or the identities of social account owners.

For example, the fraudsters can use the hijacked email account to promote additional tactics or proliferate malware by sharing links or files with the account's contacts or friends. Additionally, these people could use hijacked finance-related accounts, such as online banking, money transferring, and digital wallets, to perform unauthorized transactions or make online purchases.

To avoid becoming a prey to this type of phishing email, users should always be cautious when opening emails from unknown senders. They should verify the authenticity of the email and the sender's identity before taking any action in response to the email. Users also should avoid clicking on links in suspicious emails and should never disclose any sensitive information, such as account login credentials or personal information, to unknown or suspicious websites.


Most Viewed