This post probably should be in ATTT section but I wanted more people to have access to see it.
This is how phishing/malware e-mails work:
I received a message this morning from J.J. Douglas Services, claiming that payment on an invoice is due.
1) I don't know J.J. Douglas Services.
2) Checking the source code of the e-mail, it came from an IP registered to Bright Light Radiology in Elk Grove, IL via Comcast Business Services (ARIN.net has a WhoIs search for IPs).
3) Google search finds that J.J. Douglas Services apparently is a legitimate HVAC service in Deland, FL.
4) Google search also finds a BBB report that the name "J.J. Douglas Services" is being used in phishing e-mails.
5) A link in the message to view the invoice is coded for 6pm[dot]com[dot]pk with a php function ... which .pk domain name extension is Pakistan.
So, a message claiming to be from J.J. Douglas Services of Deland, FL, routed from Bright Light Radiology in Elk Grove, IL, with a link to view an invoice that goes to a server in Pakistan = NO. I sent the e-mail to Comcast's abuse contact for investigation.