Discerning Fake Emails Masquerading As MYOB Invoices

When it comes to using a software program for essential tasks dealing with confidential information, both developers and users are equally as concerned over potential security risks. This is why many fixes, patches and workarounds are constantly being made to maintain programs like the MYOB software. However, despite so, there is always a risk of data being compromised. In light of recent events, there have been multiple local as well as international reports that MYOB users were being sent fake emails that were designed to masquerade as MYOB invoices in an effort to gain trust. After much panic and concern, the situation is relatively contained. Yet, additional security measures are required in order to minimise risk. However, while there are concerns of such events occurring again, all is not lost since there are methods to discern these fake emails.

Here’s how to do so:

Paying closer attention to the emails will reveal that the fake emails contain invoices from different corporation names with different debt amounts (ranging from $6300 and $6400). While it may seem credible, the payment terms of the MYOB invoices however, demand immediate payment. If the corporation has been regularly dealing business with the involved parties and the payment terms are inconsistent, this should be cause for suspicion. Furthermore, most businesses usually operate around an arrangement of allowing clients to pay within certain time periods. For example, within 30 days. Customers can also expect to receive payment reminders before immediate payments are requested.

The primary function of these fake MYOB invoices would be to spread malware to the affected user’s computer systems. The fake emails are designed to look like legitimate MYOB invoices from corporations that make use of the MYOB program for business processes. After the recipient of the email clicks on the view invoice option presented within the false email, their computer is automatically compromised since that triggers a sequence to begin the process of downloading certain viruses/malware via an autorun system. Private information from internet browsers can be stolen and compromised, which leads to significant risk since a corporation’s reputation is essentially everything when it comes to business dealings. This not only affects the reputation of the affected user, but will also lead to the quality of their services being compromised.

To ascertain fake emails from real emails, one can first start with examining the sender’s domain name. Under normal circumstances, official and legitimate MYOB emails should stem from sources like emails from myob official website. instead of other variations. This can be determined without having to click on anything. Simply locate your cursor and hover above the links included in the email. This will reveal a small readable section that tells you if the links are genuinely from MYOB or not.

So as to reduce vulnerability, MYOB users are recommended to exercise caution when receiving MYOB invoices. Always make sure to check the source of the MYOB emails before clicking on anything else. If the messages are from unrecognised email addresses, it is ill advised to click on them. Business owners can also check for discrepancies from the email addresses by comparing them to the data stored within their mailing list. If the discrepancies aren’t too far off, it could be due to a recent change in email. However, if the email address contains multiple discrepancies, then it would be ideal to contact the corporation for verification. Users can also check the body of the email that was sent by comparing to previous versions. Pay attention to the addresses listed, the overall layout design as well as the writing format of the sender. Great care should be taken if the writing style do not match all other previous interactions.


Yet another precaution one can undertake would be to research and invest in the implementation of good antivirus protection. Some examples include Avast, Norton and Mcafee. These antivirus options are amongst one of the most popularly used protection for corporate users due to their reliability. Make sure that whichever antivirus protection your corporation is currently using are all kept up to date so that their level of security can be at optimal levels. Check to ensure that your computer system’s firewalls are also active.

It is also prudent to consider more measures that deter spam or malicious intent. This is especially useful for approval processes dealing with finances or sensitive information. Some examples of countermeasures like these include two factor authentication, captcha uses and more. Even with all these measures implemented, users should also trust in their instincts. Never ignore the possibility of further concern since it contributes to early discovery of problems. Users who have further queries and concerns are always encouraged to contact the staff and developers of MYOB so that they can perform validity checks.

At the end of the day, no software is completely invincible against vulnerability exploitations, malware or even hacking. While it is true that software providers should continue to monitor the health and development of their product, the software users also should play a part in reducing the risk of having their data compromised. This can be done by being aware and attending specialised MYOB training courses to understand what security measures can be undertaken, as well as what to look out for. The recent exploitation may have been one of the most prominent cases in a long time, but it is almost certain to say that this would not be the last attempt. Therefore, vigilance and attention to detail is very much so required.

MYOB users can also play a part in continuing to monitor their user experience by sharing information, techniques and tips through the MYOB online community. It is also advisable to keep up to date with MYOB software updating, potential bugs and to make use of the fixes as soon as possible. Interested users can also contact certified MYOB professionals for more insight on how to best secure their MYOB software or make editions to their MYOB invoices. Clarification to the corporation’s clients can also be made so as to ensure that the corporation’s clients can exercise vigilance on their part as well.