massive malspam campaign delivering Ursnif banking Trojan via js files

We have been seeing a massive malspam campaign today delivering Ursnif banking Trojan via js files inside zips. There have been numerous different subjects and campaign themes I will detail some of them here: Our reference: 733092244 pretending to come from Eli Murchison <Hughchaplin@yahoo.de> Hotel booking confirmation (Id:022528) pretending to Continue reading → Continue reading massive malspam campaign delivering Ursnif banking Trojan via js files

massive malspam campaign delivering Ursnif banking Trojan via js files

We have been seeing a massive malspam campaign today delivering Ursnif banking Trojan via js files inside zips. There have been numerous different subjects and campaign themes I will detail some of them here: Our reference: 733092244 pretending to come from Eli Murchison <Hughchaplin@yahoo.de> Hotel booking confirmation (Id:022528) pretending to Continue reading → Continue reading massive malspam campaign delivering Ursnif banking Trojan via js files

The monthly financial statement is attached within the email malspam delivering Locky ransomware

This Morning’s first Locky ransomware delivering malspam is an email with the subject of   Statement coming from random senders, companies and email addresses  with a random named  zip attachment  containing a JavaScript file that pretends to be a financial statement. Over the last … Continue reading →

Source

Continue reading The monthly financial statement is attached within the email malspam delivering Locky ransomware

continuing with Locky delivered via Malspam

I haven’t posted much this week about the continual Locky JavaScript downloaders because they quite frankly haven’t been worth bothering with. Yes, there have been quite a few of them, but they have been such generic emails with such vague subjects as … Continue reading →

Source

Continue reading continuing with Locky delivered via Malspam

Please find attached the statement that matches back to your invoices

Another email From the Dridex /Locky gang with the subject of  Re:  pretending to come from  random senders, companies and email addresses  with a zip attachment is another one from the current bot runs which downloads what is  almost guaranteed to be … Continue reading →

Source

Continue reading Please find attached the statement that matches back to your invoices

Malware: “Please find your monthly credit card statement attached to this e-mail”

An email with the subject of   FW: pretending to come from random senders   with a zip attachment is another one from the current bot runs which downloads what looks like Dridex banking Trojan. We had suspicions at the end of last week … Continue reading → Continue reading Malware: “Please find your monthly credit card statement attached to this e-mail”

Actual Status on Your Balance 49166 – JS malware leads to Teslacrypt ransomware

An email with the subject of  Actual Status on Your Balance 49166 [ random numbered]  pretending to come from random names and email addresses  with a zip attachment is another one from the current bot runs which downloads Teslacrypt ransomware They use email … Continue reading → Continue reading Actual Status on Your Balance 49166 – JS malware leads to Teslacrypt ransomware