Attached is the paper concerning with the cancellation of your current credit card malspam delivering Locky Ransomware

The next in the series of today’s Locky downloaders is an email with the subject of  Cancellation pretending to come from random senders  with a zip attachment containing a JavaScript file that pretends to be a pdf They use email addresses and subjects that … Continue reading →

Source

Continue reading Attached is the paper concerning with the cancellation of your current credit card malspam delivering Locky Ransomware

Vigor2820 Series New voice mail message from random telephone number on 2016/08/23 21:01:59 delivers Locky /Zepto ransomware

Today’s Locky/ Zepto ransomware malspam emails have come steadily in waves all day long. There have been 2 distinct different subjects and themes. one pretending to be a voice message from your own email domain or company, with the second pretending … Continue reading →

Source

Continue reading Vigor2820 Series New voice mail message from random telephone number on 2016/08/23 21:01:59 delivers Locky /Zepto ransomware

“Hi” , “Hi There” , “Hello” malspam delivers Locky ransomware

The next batch of malspam emails delivering locky ransomware is a series of emails with  subjects like “Hi” , “Hi There” or “Hello”   coming from  random names, companies and email addresses  with a zip attachment containing a  WSF ( Windows Scripting File) They use email addresses … Continue reading →

Source

Continue reading “Hi” , “Hi There” , “Hello” malspam delivers Locky ransomware

Today’s fax malspam word macros leads to Locky ransomware

Today’s first example of malspam word docs with macros delivering Locky ransomware is an email with the subject of Today’s fax pretending to come from random names at your own email domain . They are using email addresses and subjects that will scare … Continue reading →

Source

Continue reading Today’s fax malspam word macros leads to Locky ransomware

Cancel Attached Transaction shift-sg.com supposed to lead to Java Adwind

Following on from THIS post ( and THESE earlier ones) about Java Adwind Trojans being delivered by various financial themed emails, we see a new entry to the financial themed emails with the subject of  Cancel Attached Transaction pretending to come … Continue reading →

Source

Continue reading Cancel Attached Transaction shift-sg.com supposed to lead to Java Adwind

Attached is the copy of your payment receipt leads to Locky ransomware

The latest in a long line of generic emails delivering Locky ransomware is  an email with the subject of  Payment Receipt  pretending to come from  random companies and email addresses with a malicious word doc  attachment They are using email addresses … Continue reading →

Source

Continue reading Attached is the copy of your payment receipt leads to Locky ransomware

Unclaimed Commission Report-WUBS malspam delivers Java Adwind

We continue to see Java Adwind Trojans daily. Today’s example is a slight change to the delivery method from previous Malspam emails that have been using Moneyexpress.com or MoneyGram or other middle eastern money exchange bodies. This one is an email with … Continue reading →

Source

Continue reading Unclaimed Commission Report-WUBS malspam delivers Java Adwind

Apple / ITunes Phishing CoPilot premium HD

The latest Apple/ITunes phish pretends to be confirmation of an ITunes order for CoPilot premium HD. The email looks like : From: Apple Store Billing <apple.client30418@administrationsp.com> Date: Tue 16/08/2016 11:16 Subject: Apple Payment Ticket (REF:76228) Body content: Store Dear Apple … Continue reading →

Source

Continue reading Apple / ITunes Phishing CoPilot premium HD

Blank 2 pretending to come from your own email address delivers Locky ransomware

The second of today’s Locky ransomware examples is a blank / empty  email with the subject saying Blank 2 pretending to come from random names at your own email domain  with a zip attachment  containing a random numbered WSF ( script file) … Continue reading →

Source

Continue reading Blank 2 pretending to come from your own email address delivers Locky ransomware

generic emailing / file / document / receipt pretending to come from your own email address delivers Locky ransomware

Today’s first Locky ransomware example is a blank / empty  email with the subject saying something like   File: Scan(86)  or Emailing: Document(2) or Emailing: Receipt(8) [ random numbered] or other similar generic subjects pretending to come from random names at your own email … Continue reading →

Source

Continue reading generic emailing / file / document / receipt pretending to come from your own email address delivers Locky ransomware