Physical Address

Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine

Removal Request Approved And Initiated Email Scam

Phishing attempts continue to grow in sophistication, with attackers developing increasingly convincing lures to steal sensitive information. The “Removal Request Approved And Initiated” email scam represents a particularly deceptive phishing campaign targeting email account credentials. This comprehensive guide explains how this scam operates, its potential dangers, and provides detailed instructions for protecting yourself and recovering if you’ve been affected.

Key Facts

Threat Name “Removal Request Approved And Initiated” phishing email, Email Account Deletion Scam
Threat Type Phishing, Scam, Social Engineering, Fraud
Fake Claim Email falsely claims a request to remove the recipient’s email account has been approved and will be initiated automatically
Related Domains secure.memorys[.]click (Note: Domain has been obfuscated for security)
Detection Names
  • Trustwave: Phishing
  • Abusix: Spam
  • Fortinet: Spam
  • Sophos: Spam
Risk Level High – Can lead to account compromise, identity theft, and financial losses
Symptoms Unauthorized account access, changed passwords, suspicious account activity, identity theft

How the “Removal Request Approved” Scam Works

The “Removal Request Approved And Initiated” scam begins with victims receiving an alarming email with a subject line such as “Did you request account removal?” The message falsely claims that a request to remove the recipient’s email account has been approved and will be automatically initiated unless action is taken. This creates a sense of urgency, pushing recipients to act quickly without careful consideration.

When victims click the “Cancel Request” button (or similar action link), they’re directed to a fraudulent website designed to mimic a legitimate email service login page. In documented cases, the phishing site has been observed using the old Zoho Office Suite logo to appear legitimate, but the scam can impersonate various email providers including Gmail, Outlook, Yahoo, or corporate email systems.

Once on this fake login page, victims who enter their email credentials unwittingly surrender their access information directly to cybercriminals. With these stolen credentials, attackers can:

  • Access the victim’s email account and all sensitive information contained within
  • Use the compromised email to reset passwords for other accounts
  • Impersonate the victim to request money from contacts or spread more malware
  • Access financial accounts linked to the email address
  • Steal the victim’s identity for fraudulent purposes
Phishing Attack Flow: “Removal Request Approved” Scam Step 1: Delivery User receives urgent “Account Removal” email Step 2: User Action User clicks “Cancel Request” button in panic Step 3: Phishing Site Fake login page mimicking legitimate email provider Step 4: Theft User enters email credentials which are stolen by attackers Step 5: Compromise Attacker gains access to victim’s email account Step 6: Exploitation Identity theft, financial fraud, and account takeovers Potential Consequences • Compromised accounts • Financial losses • Identity theft • Data breaches • Malware spread

Source: Analysis of phishing attack patterns and tactics used in email account compromise

Red Flags to Identify This Phishing Scam

The “Removal Request Approved” phishing email contains several telltale signs that can help you identify it as fraudulent:

Suspicious Email Elements

  • Urgent action required: Creating false urgency about account deletion to prompt immediate action
  • Generic greeting: Often lacks personalization or specific account details
  • Grammar and spelling errors: Though some sophisticated phishing emails have improved, many still contain linguistic mistakes
  • Suspicious sender address: The email appears to come from a legitimate service but checking the actual email address reveals inconsistencies
  • Impersonal messaging: Lacks account-specific information that a legitimate service provider would include

Suspicious Link Behavior

  • Hovering over links reveals suspicious URLs: Instead of official domains (like accounts.google.com), you’ll see unrelated domains (like secure.memorys[.]click)
  • Unconventional domain extensions: Unusual TLDs (.click, .xyz, etc.) instead of common ones (.com, .org, etc.)
  • Login page doesn’t match official design: May use outdated logos or have subtle differences from legitimate pages

What to Do If You’ve Been Affected

If you suspect you’ve fallen victim to the “Removal Request Approved” phishing scam or have already entered your credentials on a suspicious site, take these immediate steps:

1. Change Your Passwords Immediately

  1. Immediately change the password for your email account (using a separate device if possible)
  2. Change passwords for all accounts connected to that email, especially financial accounts
  3. Use strong, unique passwords for each service (consider using a reputable password manager)
  4. Enable two-factor authentication (2FA) wherever possible

2. Check for Suspicious Activity

  1. Review recent login activity in your email account settings
  2. Check “sent” and “trash” folders for emails you didn’t send
  3. Look for new filters or forwarding rules that may have been set up
  4. Check financial accounts for unauthorized transactions

3. Scan Your Devices

Run a comprehensive security scan to detect any potential malware that might have been installed:

Trojan Killer scanning for malware infections
Download Trojan Killer

Download from the official website to ensure you get the authentic software

4. Report the Phishing Attempt

  1. Report the phishing email to your email provider
  2. Forward the phishing email to phishing-report@us-cert.gov
  3. File a report with the Federal Trade Commission (FTC) if in the US
  4. Report to your country’s cybersecurity authority if outside the US

How to Protect Yourself from Phishing Scams

To safeguard yourself against the “Removal Request Approved” scam and similar phishing attempts, follow these best practices:

Email Safety Best Practices

  • Verify sender details: Hover over or click the sender’s name to view the actual email address
  • Never click suspicious links: Instead, manually navigate to the service’s official website
  • Be wary of urgent requests: Legitimate companies rarely require immediate action via email
  • Check for personalization: Legitimate service emails typically include your name and account-specific details
  • Look for poor grammar or spelling: While not foolproof, many phishing emails contain linguistic errors

Advanced Security Measures

  • Use two-factor authentication (2FA): This adds an extra layer of security even if passwords are compromised
  • Keep software updated: Ensure your operating system and browsers have the latest security patches
  • Use security software: A comprehensive security solution can help detect and block phishing attempts
  • Check URLs before logging in: Verify the website address begins with “https://” and shows the correct domain

For more information on protecting yourself from various online scams, read our guide on detecting and avoiding cryptocurrency scams and protecting yourself from money mule scams.

Similar Phishing Campaigns

The “Removal Request Approved” scam is just one of many phishing campaigns targeting email users. Other notable examples include:

Frequently Asked Questions

Why did I receive this “Removal Request Approved” email?

You received this email as part of a mass phishing campaign targeting thousands of users simultaneously. Cybercriminals send these emails indiscriminately, hoping that a percentage of recipients will panic and follow their instructions. This is not a targeted attack based on your specific email usage; rather, it’s a wide-scale attempt to collect as many credentials as possible. These campaigns often purchase email lists from data breaches or use automated tools to generate potential email addresses.

Can clicking the link in the email (without entering credentials) infect my computer?

Simply clicking a link typically won’t infect your device, but it’s not entirely risk-free. Most phishing campaigns focus on credential theft rather than malware distribution, so the primary risk is reaching the fake login page. However, sophisticated attacks can sometimes exploit browser vulnerabilities to deliver malware without additional user action. This is why security experts recommend not clicking suspicious links at all. If you’ve clicked but didn’t enter any information, run a security scan as a precaution, but the risk of infection is relatively low compared to entering your credentials.

How can I tell if my email account has been compromised?

Signs of a compromised email account include: unexpected password reset emails from various services; emails in your “Sent” folder that you didn’t send; contacts receiving emails from you that you didn’t write; missing or deleted emails; new forwarding rules or filters in your account settings; unusual login notifications from different locations or devices; and unexplained account lockouts. Most email providers offer an account activity page where you can view recent logins with their associated IP addresses and locations. Check this regularly and sign out of any sessions you don’t recognize. If you spot suspicious activity, immediately change your password and enable two-factor authentication.

What information can attackers access if they compromise my email account?

When attackers gain access to your email account, they potentially have access to an extensive range of sensitive information and capabilities: all emails in your inbox, including those containing personal and financial information; attached documents that might contain sensitive data; the ability to reset passwords for other online accounts linked to your email; contact lists that can be used for further phishing attempts; personal information for identity theft; financial details mentioned in emails; access to cloud storage services connected to your email; and the ability to impersonate you in communications. This is why email account security is particularly critical – it often serves as the gateway to your entire digital life.

Conclusion

The “Removal Request Approved And Initiated” phishing scam represents a significant threat to email users, leveraging fear and urgency to trick victims into surrendering their credentials. By understanding how these scams operate and recognizing their warning signs, you can better protect yourself from falling victim.

Remember that legitimate service providers rarely send alarming emails about account deletion without prior communication, and they never ask you to verify your password through email links. When in doubt, always access your accounts directly through official websites or apps, not through email links.

By implementing the preventive measures outlined in this guide and staying vigilant when reviewing emails, you can significantly reduce your risk of falling victim to this and similar phishing attempts. If you suspect your system has been compromised, use a trusted security solution like Trojan Killer to scan for and remove potential threats.

Staying informed about current phishing tactics is your best defense in the ever-evolving landscape of cybersecurity threats.

Gridinsoft Team
Gridinsoft Team

Founded in 2003, GridinSoft LLC is a Kyiv, Ukraine-based cybersecurity company committed to safeguarding users from the ever-growing threats in the digital landscape. With over two decades of experience, we have earned a reputation as a trusted provider of innovative security solutions, protecting millions of users worldwide.

Articles: 137

Leave a Reply

Your email address will not be published. Required fields are marked *