Currently, harmless-looking emails are being sent in which the senders pose as companies or lawyers and point out an outstanding invoice.
We have different content versions of this email, but they follow the same pattern. A constructed content contains a link to a website where a supposed invoice is available for download. But be careful: these files are not invoices, but Trojans!
Apparently, these websites are probably hacked websites on whose web space the Trojan was smuggled in for download. We therefore warn against emails that are structured similarly to the following pattern.
Good morning,
Attached you will find your corresponding invoice as a DOC document.
>>> http: //[***]/_dsn/DETAILS/Kontoungserinnerung-vom-Juni-067-697/
We look forward to further collaboration!
Anian Fladerer
Or:
Good morning,
In the above-mentioned matter, we will send you the court costs invoice for the continuation of the legal proceedings as an attachment.
Since the court costs can no longer be assigned or paid by our law firm for tax reasons,
We ask that you send the amount directly to the court treasury. When making the transfer, please state the intended purpose,
In order to avoid delays in court, see the attached transfer form.
We would like to point out that the court will only continue the proceedings once the court costs have been paid.
>>> http:/ /www. [***]/DOC/Rech/
Best regards
Anian Fladerer
If you click on the built-in links, the download of a file starts. Our protection software immediately blocked this download and reported the discovery of a Trojan:
What is a Trojan?
The way they work is very similar to that of the proverbial Trojan horse: Trojans are programs that appear to be harmless, useful files. In fact, they only disguise themselves as harmless software, but in reality the program causes immense damage to the device.
How can I detect a Trojan?
This is not always easy, because the name of a Trojan is often identical to a program or data package that is actually harmless to the computer. For example, a Trojan can be called “Microsoft Word 2016” or “Vacation Photos Dominican Republic”. In some cases, however, the file extension can provide information about the true content of the program: Many Trojans are executable .exe files that simulate the installation process of the harmless file, but install spy software or viruses in the background. If a user then notices that executing the file did not install the desired software, but rather that he is led through endless installation processes and ultimately has a lot of new software on the device, but not the one he wanted, this is an indication that to have caught a Trojan.
How can I avoid Trojans?
By carefully checking the source of the file. Dubious sites and third-party files often spread Trojans. If possible, programs should be downloaded from the manufacturer's website and not from external service providers. When searching and using pirated software, many files offered do not contain the game or utility, but rather a malicious Trojan. There are also links to clouds or external sites that offer supposedly harmless files and whose harmlessness is not verified by every provider. For example, Google Drive only checks files for malware up to a certain size.
How can I protect myself from Trojans?
When unpacking files from an unknown source, anti-virus programs help, as long as the permission settings for them have been set correctly and they ideally check the file before unpacking. Overall, it is highly advisable to use files from known sources to protect yourself from Trojans .
What do I do if my computer already has a Trojan?
Simply uninstalling the Trojan or deleting the file that installed it is not enough. Trojans install keyloggers, backdoor programs and sniffers in the background, which can only be identified and rendered harmless anti-virus software Searching for these manually is almost impossible and leaving the software on the device is more than worrying as sensitive data and passwords can be stolen.
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )


