Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Phishing attempts continue to grow in sophistication, with attackers developing increasingly convincing lures to steal sensitive information. The “Removal Request Approved And Initiated” email scam represents a particularly deceptive phishing campaign targeting email account credentials. This comprehensive guide explains how this scam operates, its potential dangers, and provides detailed instructions for protecting yourself and recovering if you’ve been affected.
Threat Name | “Removal Request Approved And Initiated” phishing email, Email Account Deletion Scam |
Threat Type | Phishing, Scam, Social Engineering, Fraud |
Fake Claim | Email falsely claims a request to remove the recipient’s email account has been approved and will be initiated automatically |
Related Domains | secure.memorys[.]click (Note: Domain has been obfuscated for security) |
Detection Names |
|
Risk Level | High – Can lead to account compromise, identity theft, and financial losses |
Symptoms | Unauthorized account access, changed passwords, suspicious account activity, identity theft |
The “Removal Request Approved And Initiated” scam begins with victims receiving an alarming email with a subject line such as “Did you request account removal?” The message falsely claims that a request to remove the recipient’s email account has been approved and will be automatically initiated unless action is taken. This creates a sense of urgency, pushing recipients to act quickly without careful consideration.
When victims click the “Cancel Request” button (or similar action link), they’re directed to a fraudulent website designed to mimic a legitimate email service login page. In documented cases, the phishing site has been observed using the old Zoho Office Suite logo to appear legitimate, but the scam can impersonate various email providers including Gmail, Outlook, Yahoo, or corporate email systems.
Once on this fake login page, victims who enter their email credentials unwittingly surrender their access information directly to cybercriminals. With these stolen credentials, attackers can:
Source: Analysis of phishing attack patterns and tactics used in email account compromise
The “Removal Request Approved” phishing email contains several telltale signs that can help you identify it as fraudulent:
If you suspect you’ve fallen victim to the “Removal Request Approved” phishing scam or have already entered your credentials on a suspicious site, take these immediate steps:
Run a comprehensive security scan to detect any potential malware that might have been installed:
To safeguard yourself against the “Removal Request Approved” scam and similar phishing attempts, follow these best practices:
For more information on protecting yourself from various online scams, read our guide on detecting and avoiding cryptocurrency scams and protecting yourself from money mule scams.
The “Removal Request Approved” scam is just one of many phishing campaigns targeting email users. Other notable examples include:
You received this email as part of a mass phishing campaign targeting thousands of users simultaneously. Cybercriminals send these emails indiscriminately, hoping that a percentage of recipients will panic and follow their instructions. This is not a targeted attack based on your specific email usage; rather, it’s a wide-scale attempt to collect as many credentials as possible. These campaigns often purchase email lists from data breaches or use automated tools to generate potential email addresses.
Simply clicking a link typically won’t infect your device, but it’s not entirely risk-free. Most phishing campaigns focus on credential theft rather than malware distribution, so the primary risk is reaching the fake login page. However, sophisticated attacks can sometimes exploit browser vulnerabilities to deliver malware without additional user action. This is why security experts recommend not clicking suspicious links at all. If you’ve clicked but didn’t enter any information, run a security scan as a precaution, but the risk of infection is relatively low compared to entering your credentials.
Signs of a compromised email account include: unexpected password reset emails from various services; emails in your “Sent” folder that you didn’t send; contacts receiving emails from you that you didn’t write; missing or deleted emails; new forwarding rules or filters in your account settings; unusual login notifications from different locations or devices; and unexplained account lockouts. Most email providers offer an account activity page where you can view recent logins with their associated IP addresses and locations. Check this regularly and sign out of any sessions you don’t recognize. If you spot suspicious activity, immediately change your password and enable two-factor authentication.
When attackers gain access to your email account, they potentially have access to an extensive range of sensitive information and capabilities: all emails in your inbox, including those containing personal and financial information; attached documents that might contain sensitive data; the ability to reset passwords for other online accounts linked to your email; contact lists that can be used for further phishing attempts; personal information for identity theft; financial details mentioned in emails; access to cloud storage services connected to your email; and the ability to impersonate you in communications. This is why email account security is particularly critical – it often serves as the gateway to your entire digital life.
The “Removal Request Approved And Initiated” phishing scam represents a significant threat to email users, leveraging fear and urgency to trick victims into surrendering their credentials. By understanding how these scams operate and recognizing their warning signs, you can better protect yourself from falling victim.
Remember that legitimate service providers rarely send alarming emails about account deletion without prior communication, and they never ask you to verify your password through email links. When in doubt, always access your accounts directly through official websites or apps, not through email links.
By implementing the preventive measures outlined in this guide and staying vigilant when reviewing emails, you can significantly reduce your risk of falling victim to this and similar phishing attempts. If you suspect your system has been compromised, use a trusted security solution like Trojan Killer to scan for and remove potential threats.
Staying informed about current phishing tactics is your best defense in the ever-evolving landscape of cybersecurity threats.