Exposure to your information makes it possible for the bad guys to shift from generic e-mails to personalized e-mails including your name, address and can, through your ZIP Code, fake coupons or retail offerings from real or bogus stores in a nearby shopping mall. It could even start with a Birthday greeting. The increased cost and effort to them is petty compared to their increased potential to win.
Below are examples where the bad guys are using e-mail addresses they know they can send material to, and mixing names and e-mail address of others to mask the origin of the communication yet send it to people they know. This does not require a "cyber guru" to figure out how to mix and match. The nature of their game: sucker you into clicking the link they have provided or responding as required.
Sometimes the links may appear to be genuine company sites ... and sometimes they are. Not all companies aggressively protect their web sites so a hacker simply starts using their site to house and launch new fraudulent web pages under the web domain of a legitimate company.
So here some samples. Variations of these are very likely but you can quickly see the pattern. AND IF you are ever in doubt, all the person who appears to have sent you the material and ask them about it. But when the name and e-mail address do not align with each other, delete the e-mail and move on.
NOTE: ALL E-MAIL ADDRESS TO INNOCENT PARTIES HAVE BEEN ALTERED
DO NOT CLICK ON ANY LINKS AS THEYLINKS.
TO: firstname.lastname@example.org; sbaum1113@PDQINCO.com; email@example.com;
How are you?
Breaking news http://itprimalshopping.com/body.php It works!
orderc nicea medicationu http://companyname.com/subfolder/subfolder/repulsing.php