New terms and conditions at Comdirect: Don’t fall for this phishing email


CURRENT FRAUD WARNINGS

Phishing scammers are targeting Comdirect customers. The target is your bank details. We’ll show you how to recognize the stitch.

This email does not come from Comdirect. (Source: consumer advice center)

  • A phishing email in the name of Comdirect is circulating.
  • New terms and conditions serve as a pretext for a data comparison.
  • If fraudsters get hold of your bank details, the damage can be great.

Do you have an account with Comdirect and received an email with the subject “New message”? Then you should be on your guard. The message could be a phishing attempt that cybercriminals are using to get your personal and banking information.

The email states that an update to the terms and conditions is pending. As part of this, you are supposedly obliged to go through an identification process. A button marked “Continue” should take you to this. To put additional pressure on you, the senders claim that your bank account will be blocked for a fee if you do not complete the validation within the next 14 days.

Don’t let the empty threat put you off and don’t click on the link. As the consumer advice center reports, this leads to a fake Comdirect website that asks for all the necessary data that the fraudsters can use to gain unhindered access to your account. The financial damage can be immense.

But it doesn’t have to come to that. You can quickly tell that this is a phishing email. The dubious sender address, the impersonal salutation and the threat of account blocking are clear indicators. This scam should best end up in the spam folder unanswered.

Simple signs: How to recognize every phishing email

A first indication that you have received a phishing email: The email will ask you to confirm personal information or enter it on a website. This Under no circumstances should you comply with the demand. In addition, criminals often use the official logos of the companies they are copying in their emails, but not official sender addresses.

If the sender seems suspicious to you, you should read the email twice. You will often find spelling errors or inconsistencies in German grammar. The attackers usually do not write their own emails, but instead use automatically generated messages or translate known emails with a translation program. But why actually go to all this effort?

What do criminals achieve with phishing attacks?

Phishing is used on the Internet to collect real user data. These can be used to make money when email addresses, names and other information are sold for advertising purposes or passed on in criminal forums. With the data obtained, cyber criminals can also target future phishing attacks more specifically, making their attacks more effective.

Have you received a suspicious email?

Forward it to [email protected]
or follow us on:

Phishing checklist


  • Spelling mistake?

  • Sensitive data requested?

  • Official logos?

  • Unknown sender?

Attachments and links contained in malicious emails often introduce malware or viruses to your computer. In addition, you should not simply ignore suspicious emails. Forward it to the email address above and help us report future phishing attacks.

More fraud warnings on netzwelt – stay one step ahead of cybercriminals

But phishing emails are not the only danger lurking on the Internet. In addition to attempted fraud, there are all sorts of viruses, Trojans and malware that can infect your computer. Unfortunately, data scandals are also part of everyday digital life. You can see the five most recent articles on the topic of “fraud warnings” below:

If you want to stay informed about the latest fraud reports, subscribe to netzwelt on Twitter, Facebook and Instagram. You can also find all articles on the topic on the next page.

Don’t miss anything with this NETWORK WORLDNewsletter

Every Friday: The most informative and entertaining summary from the world of technology!

Hide Amazon orders from Alexa: Here's how

Hide Amazon orders from Alexa That’s how it’s done





Source link -67