Your Adler Invoice No. UK 314433178 IN macro malware.
Headers:
From: {service@adlerglobal.com} Subject: Your Adler Invoice No. UK 314433178 IN |
Dear Customer, Thank you very much for having placed your order with Adler. Your goods have been shipped. Please see attached invoice for payment of your order. For your convenience, you will find several payment methods described on th= e attached invoice (please be sure to include your Adler Order #). If you have any questions, feel free to contact us. Best Regards, Your Adler Customer Service Team Adler Manufacturing Limited Eastgate House, 35-43 Newport Road Cardiff CF24 0AB Tel.: 0800 0087 555 Fax 0800 0087 666 www.adlerglobal.com Adler Manufacturing Limited, Eastgate House, 35-43 Newport Road, Cardiff CF= 2 0AB Registered in England No. 2425707, VAT GB 508 16860 09041 Managing Director: D. J. Adler HSBC Bank Plc Thames Valley, IBAN GB21MIDL40420861766600, BIC MIDLGB22=0A= |
Attachment filename(s):
MD220EML.XLS
Sha256 Hashes:
0d7e028c7152a0f5701ebbde439945b68b2641d05ad562f6d439ac1aeced91e1 [1]
Malware Virus Scanner Report(s):
VirusTotal Report: [1] (detection 5/55)
Sanesecurity Signature detection:
badmacro.ndb: Sanesecurity.Badmacro.XlsM.003
Important notes:
Am I Safe?
The current round of Word/Excel/XML/Docm attachments are targeted at Windows and Microsoft Office users.
Apple (Mac/iPhone/iPad), Android and Blackberry mobiles/tablets that open these attachments will be safe.LibreOffice and OpenOffice users should also be safe but do not enable macros if asked to by the
attached file.
If you have Macros disabled in Microsoft Word or Microsoft Excel, you should be safe but again,
do not enable macros if asked to by the attached file.
However, if you are an (Mac/iPhone/iPad), Android and Blackberry mobiles/tablet user.. and forward the message to a Windows user, you will then put them at risk of opening the attachment and auto-downloading the malware.
These word/excel attachments normally try to download either...
Dridex banking trojan,
Shifu banking trojan
... both of which are designed to steal login information regarding your bank accounts either by
key logging, taking screen shots or copying information directly from your clipboard (copy/paste)
The current round of Word/Excel/XML/Docm attachments are targeted at Windows and Microsoft Office users.
Apple (Mac/iPhone/iPad), Android and Blackberry mobiles/tablets that open these attachments will be safe.LibreOffice and OpenOffice users should also be safe but do not enable macros if asked to by the
attached file.
If you have Macros disabled in Microsoft Word or Microsoft Excel, you should be safe but again,
do not enable macros if asked to by the attached file.
However, if you are an (Mac/iPhone/iPad), Android and Blackberry mobiles/tablet user.. and forward the message to a Windows user, you will then put them at risk of opening the attachment and auto-downloading the malware.
These word/excel attachments normally try to download either...
Dridex banking trojan,
Shifu banking trojan
... both of which are designed to steal login information regarding your bank accounts either by
key logging, taking screen shots or copying information directly from your clipboard (copy/paste)
It's
also worth remembering that the company itself may not have any
knowledge of this faked email and any link(s) or attachment in the email normally won't have
come from their servers or IT systems but from an external bot net.
These bot-net emails normally have faked email headers/addresses.
It's not advised to ring/email the the company themselves, as there won't really be anything they can do to help you or to stop the emails being spread.
These bot-net emails normally have faked email headers/addresses.
It's not advised to ring/email the the company themselves, as there won't really be anything they can do to help you or to stop the emails being spread.
Cheers,
Steve
5 comments:
Got this scam mail as well. Called Adler they are aware and their IT is looking into it.
This has nothing to do with Adler. All you are doing is wasting their time.
Most of these originate from botnets and are being sent out by organised criminals.
Did you not read the part that says
It's also worth remembering that the company itself may not have any knowledge of this faked email and any link(s) or attachment in the email normally won't have come from their servers or IT systems but from an external bot net.
These bot-net emails normally have faked email headers/addresses.
It's not advised to ring/email the the company themselves, as there won't really be anything they can do to help you or to stop the emails being spread.
I received 2 emails about 10 minutes apart and I am in Australia.
another scam e.mail to go with all the others blocked
Post a Comment