Jetstar customers targeted with fake emails
- 21 January, 2013 15:08
Customers who receive a flight itinerary email from Jetstar containing PDF attachments have been advised to delete the email straight away.
A Jetstar spokesman confirmed to Computerworld Australia that the itineraries have not been issued by the airline and may contain a virus.
“Jetstar no longer sends itineraries as PDF attachments,” the spokesman said in a statement. “When we send you an itinerary, all your flight details are included in the body of the email.”
According to the spokesman, the only attachment included in an official Jetstar itinerary email is a PDF labelled Tax Invoice.
Jetstar is letting its customers know about the hoax emails via a recorded message on its helpline and an alert on its Facebook page.
The Facebook post includes the following:
Some people are again receiving fake Jetstar itinerary emails. These have NOT been issued by Jetstar and we advise you NOT to open any attachment in those emails as they may contain a virus.
If you will be travelling with us shortly and would like to view your itinerary please use the ‘Manage Your Booking’ page on our website.”
Jetstar has reported the email scam to the Australian Competition and Consumer Commission (ACCC) via the Scamwatch website.
According to the airline's spokesman, the scam is similar to a phishing email which targeted Telstra customers on 15 January.
The email, which used Telstra’s new logo, said that the recipient's online bill was now available and directed the customer to click on an attachment.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Protection Storage Architecture: The What, Why, and How
Traditional backup architectures lack the flexibility, agility, and scale to meet new data protection challenges and requirements. That’s where a Protection Storage Architecture comes in. This whitepaper details how transformational architecture enables backup teams to solve immediate tactical challenges, while helping to evolve IT teams.
Quickly Delivering Products to Market
Manufacturing is held back when designer, development, production and logistics teams are dispersed across continents, and face-to-face meetings are crucial to keep projects on path. This whitepaper details how video calling and conferencing is technology’s answer to better team communications, as well as lowering costs and increasing time to market.
Security in a Faster Forward World
Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.