Scam Email Word Doc

scam-email-word-doc-screenshotScam Email Word Doc: a reader asks…

I recently received an email from someone I don’t know who sent me a Word document for something he says I asked for. I’m not sure what to do. I have Outlook and saw the note in my preview window but haven’t opened the email yet. What should I do?

Do not pass Go, delete the email without opening it or the file attachment. Scammers and hackers are constantly finding new and creative ways to get past your defenses and infect your computer. It’s almost certain that the attached Microsoft Word document has an infected macro in it that would do nasty things to your computer if you allow it. No matter what other protections (antivirus, anti-malware, etc.) you have, Word macros can bypass them all and cause mayhem. For instance, the Locky ransomware malware is now being passed around embedded in Word document macros. If you allow that macro to run, Locky would encrypt your entire hard drive and offer to ‘sell’ you a key to unencrypt it.

Advertisement

infected-word-document-exampleDon’t fall for this scam. If you were to open the Word document you might see a message telling you to enable macros on the document – doing so would unleash a potential infection that could turn your computer into a paperweight. You should treat all unsolicited incoming communications with great suspicion. That includes email, text messages, social media, phone calls, physical letters in your mailbox and even unsavory characters knocking on your door. Bad people are working very hard to scam you.

When it comes to email, it doesn’t even matter if the email looks official or looks like it comes from someone you know. Email is absurdly easy to fake, and is the most common way that scammers and hackers use to bypass your computer protections. That’s because they depend on our natural tendency to trust, and if we unknowingly or unthinkingly give permission for malware to infect our computers, we are bypassing our protection programs. Protection programs (like Bitdefender & Malwarebytes) are good at telling us we’re doing something risky, but if we ignore the warnings, they can’t protect us from ourselves.

 


This website runs on a patronage model. If you find my answers of value, please consider supporting me by sending any dollar amount via Click or tap to open a new browser tab or your Venmo app and send money via Venmo to @positek (send to @PosiTek), Click or tap to open a new browser tab or your Paypal app to send money via your Paypal account to support@positek.net (send to Support@PosiTek.net), Click or tap to open a new browser tab or your Paypal app to send money using your credit card to support@positek.net (no Paypal account required) using any credit card (no Paypal account required), using Zelle, Apple Pay or Google Pay, or by mailing a check or cash to PosiTek.net LLC 1934 Old Gallows Road, Suite 350, Tysons Corner VA 22182. I am not a non-profit, but your support helps me to continue delivering advice and consumer technology support to the public. Thank you!

Go to Top of Page

Leave a Comment

Your email address will not be published. Required fields are marked *

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

This site uses Akismet to reduce spam. Learn how your comment data is processed.