Using QuickBooks to Make a Quick Buck
QuickBooks Logo

Using QuickBooks to Make a Quick Buck

QuickBooks is a popular accounting software that offers free accounts to its users. While many individuals and organizations use QuickBooks to track their finances, cybercriminals have been using it to run a “business” of their own. In a new scam, cybercriminals create a free QuickBooks account and use the associated email address to send you malicious emails.

To start, cybercriminals send you a phishing email that appears to be an invoice from a reputable organization, such as Norton or Microsoft. The email includes a phone number and directs you to call if the invoice seems suspicious. If you call the phone number, you’ll be asked to confirm your credit card information to cancel the fake transaction. Unfortunately, if you share this information, the cybercriminals can use it to make their own purchases.

To protect yourself from this malicious scam, follow the tips below:

  • Never call a phone number provided in a suspicious email. Instead, visit the organization’s official website to find their contact information.
  • If you’re asked to verify payment information over the phone, ask the caller to tell you what they have on file. If they decline, only provide the last four digits of your payment card number.

Cybercriminals can use fake invoices to alarm you and trick you into clicking impulsively. Always think before you click!


Stop, Look, and Think. Don’t be fooled.

Protect your network! Learn more about security awareness training for your team.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Man Laptop Cybersecurity
Cybersecurity

SMB Cyber Targets

Majority of Cyber Incidents Now Target Small & Medium Businesses (SMBs) Cybercrime is a pervasive threat that affects individuals across all socioeconomic backgrounds, yet its

Doctor Hands Laptop Image
Ransomware

Unveiling the Human Element in Ransomware Attacks

In recent years, high-profile ransomware attacks have shaken industries and organizations worldwide. As technology advances, so do the tactics employed by threat actors. However, a

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs