Delivery Confirmation Receipt – Tracking #529F84634 – JS malware leads to Locky ransomware

Last revised or Updated on: 29th March, 2016, 3:46 PMAn email with the subject of  Delivery Confirmation Receipt – Tracking #529F84634 [ random numbered]  pretending to come from random email addresses  with a zip attachment is another one from the current bot runs which downloads Locky ransomware They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. One of the emails looks like: From: Wally cruix/cruik <cruix/cruikWally51@woonpalace-boelhouwers.nl> Date: Tue 29/03/2016 15:36 Subject: Delivery Confirmation Receipt – Tracking #529F84634 Attachment: ans_invoices_417835.zip Body content: Your parcel has been delivered at … Continue reading → Continue reading Delivery Confirmation Receipt – Tracking #529F84634 – JS malware leads to Locky ransomware

UKMail Customer Services Proof of Delivery Report: 16/03/16-17/03/16 – word doc macro malware leads to Dridex

Last revised or Updated on: 18th March, 2016, 10:18 AMAn email with the subject of  Proof of Delivery Report: 16/03/16-17/03/16 pretending to come from UKMail Customer Services <list_reportservices@ukmail.com>  with a malicious word doc or Excel XLS spreadsheet attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt. They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. The email looks like: From: UKMail … Continue reading → Continue reading UKMail Customer Services Proof of Delivery Report: 16/03/16-17/03/16 – word doc macro malware leads to Dridex

Invoice DOINV32142 from Tip Top Delivery – word RTF malware leads to Dridex

Last revised or Updated on: 17th March, 2016, 5:34 PMAn email with the subject of  Invoice DOINV32142 from Tip Top Delivery ( random characters)   pretending to come from  random email addresses with a malicious word doc RTF attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt. They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. The email looks like: From: random … Continue reading → Continue reading Invoice DOINV32142 from Tip Top Delivery – word RTF malware leads to Dridex