Using QuickBooks to Make a Quick Buck
QuickBooks Logo

Using QuickBooks to Make a Quick Buck

QuickBooks is a popular accounting software that offers free accounts to its users. While many individuals and organizations use QuickBooks to track their finances, cybercriminals have been using it to run a “business” of their own. In a new scam, cybercriminals create a free QuickBooks account and use the associated email address to send you malicious emails.

To start, cybercriminals send you a phishing email that appears to be an invoice from a reputable organization, such as Norton or Microsoft. The email includes a phone number and directs you to call if the invoice seems suspicious. If you call the phone number, you’ll be asked to confirm your credit card information to cancel the fake transaction. Unfortunately, if you share this information, the cybercriminals can use it to make their own purchases.

To protect yourself from this malicious scam, follow the tips below:

  • Never call a phone number provided in a suspicious email. Instead, visit the organization’s official website to find their contact information.
  • If you’re asked to verify payment information over the phone, ask the caller to tell you what they have on file. If they decline, only provide the last four digits of your payment card number.

Cybercriminals can use fake invoices to alarm you and trick you into clicking impulsively. Always think before you click!


Stop, Look, and Think. Don’t be fooled.

Protect your network! Learn more about security awareness training for your team.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

The Latest Scams

YIKES! Malware Scam Targeting Gamers

In the vast expanse of cyberspace, where innovation meets nefarious intent, cybercriminals continually devise new methods to ensnare unsuspecting victims. A recent scam has emerged

Data Backup Image
Cybersecurity

Protecting Your Data with Immutable Backups

In today’s digital landscape, data is the lifeblood of organizations, driving decision-making, innovation, and growth. However, with the rise in cyber threats and data breaches,

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs