

Of course, even if you missed the spelling mistakes (a genuine retailer or cloud service is unlikely to mis-spell the word invoce, which should be invoice), the link would be a giveaway – this one uses a URL shortening service, but with an HTTP (insecure) URL instead of HTTPS. Indeed, it’s the sort of glitch you’ve probably dealt with once or twice before, and that you may well have resolved entirely online without even leaving your browser. It’s the sort of thing that might easily happen from time to time – a recurring credit card transaction that’s temporarily failed – and that in real life is usually pretty easy to sort out. It’s not overly dramatic, it’s not threatening, and it’s polite. Sadly for the crooks, and fortunately for anyone who received this scam, the tiny bit of text that the criminals decided to write by themselves contains several rather jarring errors.įor the most part, however, this email is disarmingly simple, and therefore surprisingly believable, for all that it’s given away by typos, grammatical mistakes and orthographic errors. We tried to bill you automatically but you local bank being held a transaction. This is a notice to remind you that you have an invoice due on. That’s what Naked Security Editor-in-Chief, Anna Brading, thought when she received this scam yesterday: It’s also a lot less effort to copy genuine content and adapt it just a little than to try to create your own material from scratch. They work because scammers know that the less inventive they are, the more believable their messages become. …for the sadly simple reason that THEY WORK. We’ve written about these scams before, and we’ll probably write about them again…
