Attached is the copy of your payment receipt leads to Locky ransomware

The latest in a long line of generic emails delivering Locky ransomware is  an email with the subject of  Payment Receipt  pretending to come from  random companies and email addresses with a malicious word doc  attachment They are using email addresses … Continue reading →

Source

Continue reading Attached is the copy of your payment receipt leads to Locky ransomware

Documents from Purple Office malspam delivers Locky ransomware

The next in the series of today’s Locky ransomware delivery malspam emails is Documents from Purple Office – IN00051913 purple-office.com has not been hacked or had their email or other servers compromised. They are not sending the emails to you. … Continue reading →

Source

Continue reading Documents from Purple Office malspam delivers Locky ransomware

Emma Critchley advantage-finance.co.uk Emailing – 5147245972715 leads to Locky ransomware

After the slightly earlier Locky malspam run we now have an email with the subject of  Emailing – 5147245972715 ( random numbers) pretending to come from Emma Critchley < emmacritchley@advantage-finance.co.uk > with a malicious word doc attachment is downloads Locky … Continue reading →

Source

Continue reading Emma Critchley advantage-finance.co.uk Emailing – 5147245972715 leads to Locky ransomware

Order Confirmation-9355-8379094-20160815-474623 Esab.co.uk leads to Locky ransomware

An email with the subject of Order Confirmation-9355-8379094-20160815-474623  pretending to come from orderconfirmation@esab.co.uk with a malicious word doc attachment  is downloads Locky ransomware They are using email addresses and subjects that will scare or entice a user to read the email and open … Continue reading →

Source

Continue reading Order Confirmation-9355-8379094-20160815-474623 Esab.co.uk leads to Locky ransomware

Dear client We have detected the attempt of transaction from your bank – word malspam

A series of  emails saying Dear client! We have detected the attempt of transaction from your bank account.  coming from random senders   with a malicious word docattachment  is another one from the current bot runs which try to download various Trojans … Continue reading →

Source

Continue reading Dear client We have detected the attempt of transaction from your bank – word malspam

Another malspam word doc pretending to come from your own email address delivers Locky / zepto ransomware

An email with the subject of FW: Documents Requested  pretending to come from  a random name at your own email domain with a malicious word doc attachment is another Locky / zepto ransomware dropper They are using email addresses and subjects that … Continue reading →

Source

Continue reading Another malspam word doc pretending to come from your own email address delivers Locky / zepto ransomware

VP Invoice/Credit/Statement – H10040 malspam leads to Locky

The second of Today’s Locky downloaders is an email with the subject of VP Invoice/Credit/Statement – H10040  pretending to come from Prism Server Account <accounts@vpplc.com>  with a malicious word doc attachment which downloads Locky ransomware They are using email addresses and … Continue reading →

Source

Continue reading VP Invoice/Credit/Statement – H10040 malspam leads to Locky

Sent from my Samsung device malspam word macro delivers Locky

Following on from THIS earlier Malspam delivering Locky ransomware via WSF files inside a zip we are also  seeing a concurrent malspam run using Word Docs with macros. They are very terse and simple emails with a subject of  Scan****** ( random … Continue reading →

Source

Continue reading Sent from my Samsung device malspam word macro delivers Locky

Please find the bill enclosed with this msg malspam word docs delivers unknown malware

An email with the subject of Re: senders name  pretending to come from  random senders with a malicious word doc attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex … Continue reading →

Source

Continue reading Please find the bill enclosed with this msg malspam word docs delivers unknown malware

Scanned image pretending to come from your own email domain delivers Locky

An email with the subject of Scanned image pretending to come from random names at your own email domain or company   with a malicious word doc macro attachment delivers Locky Ransomware They are using email addresses and subjects that will scare or entice … Continue reading →

Source

Continue reading Scanned image pretending to come from your own email domain delivers Locky