....malware developers blew past that primitive approach in a matter of months and quickly learned to search not only the address book but also scan for email addresses contained in any file.
Good to know. Thanks. Here’s why the suggestion was sent to me:
I am a volunteer executive with a pensioners association and received an email that, at first glance, appeared to be from our President. In the From
section, the email had his name but his address was wrong.Using my first name
, which is NOT in my email address, the email was looking for a response from me: “Are you available to talk? Let me know.”
So, I called the President and, sure enough, he had not sent the email but he recently had problems with email while setting up a new computer (Windows).
Soon after, we learned that others on the executive received similar emails, purporting to come from the President.
I assume that, if I had simply responded to the original email, I would have been confirming that my email address and name were valid. So, I guess, the bottom line is always to be vigilant.
Quick question: In this case, is it most likely that the President’s email issue was the culprit? Or could it simply have been any one of the executive, who’d all have the same list of recipients?