Email management involves the way users control their email accounts as this is a major way cybercriminals compromise their targets' computer devices.

How does this work?

Email is a convenient way to keep in contact with others and share files. It is also an easy way for criminals to approach you and attempt to take control of your computer.

Cybercriminals buy large lists of email addresses and send bulk lists to potential targets. Attached to the email is often a link or file attachment which they want you to click on, thereby infecting your computer with a virus that allows them to take control of your computer.

An alternative strategy is to attack a document, spreadsheet, movie or joke to the email which has the malicious software enclosed. When the attachment is opened, the computer is infected.

With the amount of personal information available online, some cybercriminals locate this information and personalise the email so when it is read by the target, it appears as if it is written a person who personally or professionally knows them. The attachment or link may indicate personal information of value, building on the personal information located within the body of the email.

How do I protect myself?

When an email is received, view the sender's address to recognise whether it is from someone that you know or from a stranger. If it is a stranger, delete it without opening!

If someone is offering you an opportunity to become wealthy by taking up a unique opportunity, delete the email as it is fraudulent. Numerous individuals have lost large sums of money by replying to an email from a person they do not know and beginning a conversation with a professional fraudster.

Other potential fraudulent email threats include:

  • Returned message
  • Delivery notice from Australia Post or a courier company
  • Prize notification
  • Inheritance notification
  • Spreadsheet attachment

Report this crime

This crime should be reported to the Australian Cyber Security Centre (ACSC).