Last revised or Updated on: 22nd March, 2016, 4:44 PMFollowing on from THIS malspam run this morning with almost identical subjects is an email with the subject of Urgent: F184255 SAFESTORE HLDGS PLC/ HPE pretending to come from random names and email addresses with a malicious word .doc and an .RTF attachment is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt. They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better … Continue reading →