Identify Threat
Please provide accurate answers in order to identify if its a legitimate or not a legitimate action.
Did you act upon it?
Specify what action did you take
Screenshot Evidence
Screenshot of suspicious email, text, or message further analysis.
Report Incident
Complete Report
Method you have received
Please specify:
Action:
Recovery measure: We recommend that you change your device password, all account passwords and run a full device scan on the Anti-Virus program. If you don’t have an Anti-Virus program installed, please purchase one. If this happened on a work computer, we highly recommend that you report the incident to the proper authority.
ATTENTION: Do not forward suspicious email or text to anyone since it can spread the malicious program. We recommend asking the third-party to delete the email, text, or message that you sent.
Do not reply to the suspicious sender, cybercriminals are using sophisticated tactics to penetrate your defense. As an example, criminals identify if your email is active when the victim replies to the sender.
Excellent work.
Evidence (attach screenshots)
Information such as: Subject, sender
Max. size: 512.0 MB
Message body
Max. size: 512.0 MB
Attachment names, or hover-over urls to identify validity.
Max. size: 512.0 MB