What is Your free trial period is almost over email scam?
It is common that scammers/cybercriminals use email as a tool to trick recipients into transferring them money, providing sensitive information, or even installing malware on their computers.
Typically, cybercriminals disguise their emails as urgent, important, official letters from legitimate companies, organizations, or other entities. It is important to know that when emails are used to deliver malware, they contain a website link or attachment.
It is known that there are at least eleven variants of this email scam. Although, all these emails are more or less similar. Scammers behind them attempt to trick recipients into believing that the free trial period for some service is almost over, but the monthly subscription, which costs $89.99, will be continued.
In other words, scammers use these emails to trick recipients into believing that if they do not cancel the subscription, then they will be billed $89.99 every month.
In order to cancel or change or cancel the subscription plan, these emails encourage recipients to call the provided number, +1 (510) 992 2612, or +1 (661) 501 2041.
It is common that scammers behind such emails ask to provide personal information such as name, surname, email address, credit card details, bank account number, login credentials, or other sensitive information.
Their main purpose is to extract information that could be used to steal personal accounts, identities, make unauthorized purchases, transactions, or for other purposes. Therefore, recipients who fall for these scams lose money, cannot access their accounts, and (or) encounter other issues.
As mentioned in the first paragraph, emails also can be used to deliver malware. In such cases, they contain a malicious attachments, or a download website/link for a malicious file.
It is known that scammers (cybecriminals) behind this campaign, once contacted, ask recipients to go to a website, download a malicious Microsoft Excel document open it and then enable editing (macros commands).
Once macros commands are enabled, that document installs BazarLoader - backdoor/loader trojan. Cybercriminals behind this loader can use it as a tool to infect computer with additional malware, for example, ransomware, cryptominers.
Typically, malware like BazarLoader is used to infect systems with other software of this kind that steals sensitive information (e.g., banking information, credentials), mines cryptocurrency using computer hardware, encrypts data and demands ransom, etc.
Therefore, scammers behind this email should never be contacted and more importantly, malicious documents (or other files) downloaded from shady websites should never be downloaded and opened.
It is important to mention that BazarLoader is not the only malicious software that cybercriminals may be delivering via this malspam campaign.
|Name||Your free trial period is almost over email scam|
|Threat Type||Phishing, Scam, Social Engineering, Fraud|
|Fake Claim||Subscription plan costing $89.99 per month will be continued|
|Scammer Number||+1 (510) 992 2612, +1 (661) 501 2041, +1 (720) 738 7597, +1 (816) 307 4271|
|Disguise||Letter from Medical Reminder Service|
|Symptoms||Unauthorized online purchases, changed online account passwords, identity theft, illegal access of the computer.|
|Distribution methods||Deceptive emails, rogue online pop-up ads, search engine poisoning techniques, misspelled domains.|
|Damage||Loss of sensitive private information, monetary loss, identity theft.|
|Malware Removal (Windows)||
To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
It is also possible that scammers behind this scam campaign would ask to provide remote access to computers and then use the provided access to steal information, open personal files, documents, or install malware (e.g., ransomware, Trojan-type malware).
Also, they may offer to purchase some unnecessary or fake software or use some paid services. In one way or another, this email scam (any of the variants) has to be ignored/the number provided in any of the emails should not be called.
More examples of email scams are "Facebook Lottery Email Scam", "Banca Sella Email Scam", and "We Are Interested In Buying Your Product Email Scam". As mentioned in the first paragraph, emails can be used to deliver malicious software.
How do spam campaigns infect computers?
Emails that cybercriminals use to deliver malware contain malicious attachments or website links. Either way, the main purpose of these emails is to trick recipients into downloading and opening a malicious file.
It is important to mention that not all files in these emails install malicious software right after opening them. For example, malicious documents opened with Microsoft Office 2010 or newer do not install malware unless users enable editing or content (macros commands).
Although, malicious documents opened with any older MS Office version infect computers without asking to enable macros commands.
How to avoid installation of malware?
Software (and files) should be downloaded from official, trustworthy websites and through direct links. Peer-to-Peer networks, unofficial pages, third-party downloaders, installers, etc., can be used to proliferate malicious programs.
Therefore, it is strongly recommended not to use them to download or install any software. Attachments (and links) in irrelevant emails received from unknown, suspicious addresses should not be opened. Very ofte, emails of this kind are used to deliver malicious software.
If there is any reason to suspect that some email is received from cybercriminals, then it should be ignored. All installed software has to be updated and activated with tools (or functions) that official software developers provide. It is never safe to use third-party, unofficial tools for that.
It is important to know that it is not legal to activate licensed software using 'cracking' tools, or use pirated software. And finally, a computer should be scanned for threats regularly, it should be done with a reputable antivirus or anti-spyware software.
If you've already opened malicious attachments, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.
Text in the email scam variant provided above:
Subject: Do you want to extend your free trial RJK19335628
Dear Subscriber, #RJK19335628
Your free trial period is almost over... How was it?. But thank you for choosing to stay with us!
The method of payment you mentioned will be used to continue your subscription
The plan you selected will cost you only $89.99 per month.
We are really excited that you are with us, let's move to premium!
In case you want to know more details about your order you can always contact us: +1 (510) 992 2612
Thank you for choosing us!
5901 W Century Blvd #750, Los Angeles, CA 90045
Copyright © 2021 iMed Service, Inc. All rights reserved.
+1 (510) 992 2612
This email has been scanned for viruses by Microsoft email security.cloud service
Screenshots of other scam variants:
Here's a video of a malware researcher trying to contact cyber criminals behind this email scam. Crooks eventually attempt to trick the caller into downloading and opening a malicious MS Excel document designed to inject BazarLoader malware into the system:
Additional example of "Your Free Trial Period is Almost Over" scam email:
Text presented within:
Subject: 0412791819262. All set to go for a premium plan?
Dear respectable User, #0412791819262
We really hope you have really enjoyed your premium plan features.
Once your demo expires, we will revise your premium automatically using the credit card you provided earlier.
Now is a great chance to up-date and obtain all the wonderful features.
View the unlimited number of publications with our on line collection.
Want to get a decent discount for your relatives? Simply stop by our site, to view our family members subscriptions.
We are glad that you made a decision to be our premium plan user!
If you wish to stop your current plan, please give us a call at +1 720 738 7597
Book Heaven Staff
This email was dispatched from an unmonitored contact. Don't Answer back.
2109 S Ocean Blvd #843, Los Angeles, CA 90080
Copyright laws © 2021 Book Wonderland, Inc. All legal rights are reserved.
This specific message was effectively passed by AVG
Screenshot of a malicious MS Excel document distributed using this email spam campaign. The document is injected with Campo Loader which, in turn, downloads and install additional malware (such as BazarLoader, Ursnif/Gozi or TrickBot).
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
- What is "Your free trial period is almost over email scam"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Combo Cleaner Antivirus for Windows.
If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK.
During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button.
Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button.
Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options".
In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files.
After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer.
Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs.
These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Combo Cleaner Antivirus for Windows.