{"id":28159,"date":"2024-10-01T17:03:00","date_gmt":"2024-10-01T15:03:00","guid":{"rendered":"https:\/\/perseus.de\/in-focus-quadruple-email-scam-scam\/"},"modified":"2026-03-31T14:39:10","modified_gmt":"2026-03-31T12:39:10","slug":"in-focus-quadruple-email-scam-scam","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/","title":{"rendered":"In Focus: Quadruple Email Scam Scam"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28159\" class=\"elementor elementor-28159 elementor-23021\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In Focus: Quadruple Email Scam Scam\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Cybercriminals rely on email scams. But anyone who thinks that criminals only send clumsy phishing attempts with poorly written, faulty emails is mistaken. Criminals sometimes put a lot of effort into planning, designing, and executing email fraud. The experts of the Incident Response Management Team have recorded an increase in these attacks. To show you how sophisticated some of these attacks are, we present the following case. You will see the attackers send fake emails, misuse the names of well-known companies for their scam, invent products, create fake websites, copy real companies, and more.     <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"295\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png\" class=\"attachment-medium_large size-medium_large wp-image-28157\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png 600w, https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1-300x148.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Ioannis Karathanasis via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>What happened?<\/h4>\n<p>One company was allegedly contacted by email from Unilever Netherlands, a large consumer goods group. In reality, however, it was a request from an unknown third party for a larger number of a very specific type of pump. Attached to the e-mail was a tender. Since the company did not have this type of pump in stock itself, they looked for other suppliers and found what they were looking for. The company ordered the pumps from this supplier and at the same time sent a non-binding offer to what they believed to be Unilever Netherlands.    <\/p>\n<p>The supplier immediately got back to us with the confirmation that he could deliver the desired pumps. However, he demanded payment for the goods in full in advance. It was a high five-digit sum. As there was an increased risk, the company asked for a 50% reduction in the down payment while obtaining a vote from its financial partner to verify the supplier&#8217;s legitimacy. The result was positive. Unfortunately, this analysis was flawed.     <\/p>\n<p>After the company had also obtained further information about the supplier, the deposit of approximately \u20ac26,000 was transferred. After receiving this sum, the supplier contacted us again and asked for the full sum regardless of the agreement. The company no longer complied with this demand, because in the meantime they realized that they had fallen for a scam.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e53c2f1 e-flex e-con-boxed e-con e-parent\" data-id=\"e53c2f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65ddef8 elementor-widget elementor-widget-heading\" data-id=\"65ddef8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How did the attackers proceed?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb62d5b e-flex e-con-boxed e-con e-parent\" data-id=\"fb62d5b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-06ff9ce e-con-full e-flex e-con e-child\" data-id=\"06ff9ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2951957 elementor-widget elementor-widget-text-editor\" data-id=\"2951957\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In order to lull the victims into a false sense of security, a very well-known company \u2013 in this case a world-famous consumer goods company \u2013 is used to make contact. The initial e-mail was an inquiry for a product, a specific pump. If you searched for this pump on the Internet, you quickly found what you were looking for and were directed to a very authentic-looking company website that carries exactly this product. But both the make of the pump, the product number and the company that supposedly had these pumps in stock were fictitious or fake. The websites of the alleged suppliers, including the company name, domain and logo, were also created, registered and forged for the purpose of fraud.     <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88df65d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"88df65d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"290\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Fake-Company-400x290-1.png\" class=\"attachment-large size-large wp-image-28158\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Fake-Company-400x290-1.png 400w, https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Fake-Company-400x290-1-300x218.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52b3657 e-flex e-con-boxed e-con e-parent\" data-id=\"52b3657\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c809314 elementor-widget elementor-widget-text-editor\" data-id=\"c809314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>How could the fraud have been recognized?<\/h4>\n<p><\/p>\n<p>In these cases, absolute caution is really advised. Because the fraudsters proceed in a highly professional manner. To solve the case, Perseus&#8217; forensic experts analyzed the entire communication between the victim and the attackers and were able to identify indications of fraud. In order to be able to recognize these indications yourself, a trained eye is required.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f945541 e-flex e-con-boxed e-con e-parent\" data-id=\"f945541\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-83d95b2 e-con-full e-flex e-con e-child\" data-id=\"83d95b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6f819 elementor-widget elementor-widget-text-editor\" data-id=\"3d6f819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft wp-image-23025 size-full\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Grafik-HP-1-400x260-1.png\" alt=\"\" width=\"400\" height=\"260\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Grafik-HP-1-400x260-1.png 400w, https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Grafik-HP-1-400x260-1-300x195.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><strong>Here are our tips:<\/strong><\/p>\n<ol>\n<li>Examine the sender profile of the emails carefully. The sender name can be easily manipulated. At first glance, it looks as if the email comes from a reputable company, such as Unilever. However, the sender address often does not match the sender name. Even small signs such as a transposed letter or another domain at the end of the email can be an indication that fraud has occurred.    <\/li>\n<li>Be vigilant with generic, non-person-specific salutations. In the present case, for example, the recipient(s) were placed in &#8220;Blind Carbon Copy (BCC)&#8221;. The victim was therefore not explicitly contacted, but the e-mail was probably sent to several unknown recipients.  <\/li>\n<li>Examine the recipient&#8217;s address. Well-known and reputable companies mostly use simple email addresses. Unilever&#8217;s communication, for example, takes place via @unilever.com and not via @unileverbrasil.com or @unilevernetherlands.com. Another indication that this is not a serious request.   <\/li>\n<li>The IP address used to send the e-mails can also provide further indications as to whether fraud has occurred. For example, by tracing the company or organization to which the IP belongs or from which country the e-mails are sent. <\/li>\n<li>Analyze the website carefully. In the present case, the fraudsters created a homepage on which the desired pumps were offered. The criminals used a name of a real company and adapted it slightly. The company name ended in -tech. The attackers use the -tec extension. The logo looked confusingly similar to that of the real company, only here too the ending was changed from -tech to -tec.     <\/li>\n<li>Get in touch with a company with which you have no business relationship personally and always verify legitimacy. This is especially true for financial transactions. <\/li>\n<\/ol>\n<p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53ce9db e-flex e-con-boxed e-con e-parent\" data-id=\"53ce9db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d219ff3 elementor-widget elementor-widget-text-editor\" data-id=\"d219ff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>This is our advice to companies that have fallen victim to fraud!<\/h4>\n<ul>\n<li>Report the incident to the responsible Central Contact Point for Cybercrime (ZAC) in your federal state. In this way, foreign investigative authorities can provide support if necessary and the path of the money can be traced.<br>Criminal complaint to the police. <\/li>\n<li>Train your employees and make them aware of digital threats from the Internet.<br><strong>Tip:<\/strong> <strong>Perseus offers you a sustainable <a title=\"Cybersecurity Online Portal\" href=\"https:\/\/perseus.de\/loesungen\/online-portal-fuer-cybersicherheit\/\">prevention package<\/a> with online training, phishing simulations, danger warnings and other useful tips and tools for everyday life.<\/strong><\/li>\n<li>Check to see if the scam has affected other parties or if there is a potential for other parties to be affected by the scam. If this is the case, get in touch with the organizations. <\/li>\n<li>Evaluate the incident in detail and question existing processes and structures. If you find gaps, close them and optimize your business processes. <br><strong>Tip:<\/strong> <strong>Rely on external support from experts for implementation. <a href=\"https:\/\/perseus.de\/loesungen\/cybernotfall-management\/\">Perseus can advise you here<\/a>.<\/strong><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Download the case study to learn:\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\">\n<li>How did the attackers proceed in concrete terms?<\/li>\n<li>What were the consequences for the parties involved?<\/li>\n<li>What tips do our experts give companies that are affected by attacks of this kind?<\/li>\n<li>What measures should be taken to prevent these attacks?<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe style=\"display: block; margin-left: auto; margin-right: auto; max-width: 100%;\" src=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAKjh13Z_i-Lj4seXh5yJIRE2tN5LXhKD9xwb118DBgzLfr2FaP_xIcAp7WZTm431dzv_IEbFl1sI2TnWR5QaubZcOHtgmHJXQT_pF0u6BYCQrFYWGFa2a2U0N5CmVtvXCcwhhj49cG2qKHYfVwAD5SuGbElfc0n4sFPhywfHiSm_XZSR02l0Fsnjy4bVj3h0sk_uBIzATqpR\" width=\"540\" height=\"720\" frameborder=\"0\" scrolling=\"auto\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-901d973 e-flex e-con-boxed e-con e-parent\" data-id=\"901d973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64e2e04 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"64e2e04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybercriminals rely on email scams. But anyone who thinks that criminals only send clumsy phishing attempts with poorly written, faulty emails is mistaken. Criminals sometimes put a lot of effort into planning, designing, and executing email fraud. The experts of the Incident Response Management Team have recorded an increase in these attacks. To show you how sophisticated some of these attacks are, we present the following case. You will see the attackers send fake emails, misuse the names of well-known companies for their scam, invent products, create fake websites, copy real companies, and more.     <\/p>\n","protected":false},"author":3,"featured_media":28157,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-28159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In Focus: Quadruple Email Scam Scam - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In Focus: Quadruple Email Scam Scam - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals rely on email scams. But anyone who thinks that criminals only send clumsy phishing attempts with poorly written, faulty emails is mistaken. Criminals sometimes put a lot of effort into planning, designing, and executing email fraud. The experts of the Incident Response Management Team have recorded an increase in these attacks. To show you how sophisticated some of these attacks are, we present the following case. You will see the attackers send fake emails, misuse the names of well-known companies for their scam, invent products, create fake websites, copy real companies, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-01T15:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:39:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"In Focus: Quadruple Email Scam Scam\",\"datePublished\":\"2024-10-01T15:03:00+00:00\",\"dateModified\":\"2026-03-31T12:39:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/\"},\"wordCount\":1020,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"articleSection\":[\"Case Studies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/\",\"name\":\"In Focus: Quadruple Email Scam Scam - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"datePublished\":\"2024-10-01T15:03:00+00:00\",\"dateModified\":\"2026-03-31T12:39:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"width\":600,\"height\":295},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-quadruple-email-scam-scam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In Focus: Quadruple Email Scam Scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In Focus: Quadruple Email Scam Scam - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/","og_locale":"en_US","og_type":"article","og_title":"In Focus: Quadruple Email Scam Scam - Perseus Technologies","og_description":"Cybercriminals rely on email scams. But anyone who thinks that criminals only send clumsy phishing attempts with poorly written, faulty emails is mistaken. Criminals sometimes put a lot of effort into planning, designing, and executing email fraud. The experts of the Incident Response Management Team have recorded an increase in these attacks. To show you how sophisticated some of these attacks are, we present the following case. You will see the attackers send fake emails, misuse the names of well-known companies for their scam, invent products, create fake websites, copy real companies, and more.","og_url":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/","og_site_name":"Perseus Technologies","article_published_time":"2024-10-01T15:03:00+00:00","article_modified_time":"2026-03-31T12:39:10+00:00","og_image":[{"width":600,"height":295,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"In Focus: Quadruple Email Scam Scam","datePublished":"2024-10-01T15:03:00+00:00","dateModified":"2026-03-31T12:39:10+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/"},"wordCount":1020,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","articleSection":["Case Studies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/","url":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/","name":"In Focus: Quadruple Email Scam Scam - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","datePublished":"2024-10-01T15:03:00+00:00","dateModified":"2026-03-31T12:39:10+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","width":600,"height":295},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/in-focus-quadruple-email-scam-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"In Focus: Quadruple Email Scam Scam"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/28159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=28159"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/28159\/revisions"}],"predecessor-version":[{"id":28160,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/28159\/revisions\/28160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/28157"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=28159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=28159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=28159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}