<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Search Results  &#187;  blackhole</title>
	<atom:link href="http://www.gfi.com/blog/search/blackhole/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Email Threats Highlights: US Airways and American Airlines Spam</title>
		<link>http://www.gfi.com/blog/email-threats-highlights-us-airways-and-american-airlines-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-threats-highlights-us-airways-and-american-airlines-spam</link>
		<comments>http://www.gfi.com/blog/email-threats-highlights-us-airways-and-american-airlines-spam/#comments</comments>
		<pubDate>Fri, 08 Feb 2013 06:17:19 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[aa]]></category>
		<category><![CDATA[american airlines]]></category>
		<category><![CDATA[email threat roundup]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[us airways]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10300</guid>
		<description><![CDATA[Our researchers in the AV Labs found the following malicious spam campaigns related to airline flights that we&#8217;re highlighting this week: &#8216;Preferred Seat Order&#8217; leads to malware infection. Patrons of American Airlines (AA) were targetted by online criminals via a surge of spam &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/email-threats.png"><img class="alignleft size-thumbnail wp-image-10315" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/email-threats-150x150.png" alt="" width="150" height="150" /></a>Our researchers in the AV Labs found the following malicious <a href="http://www.gfi.com/exchange-server-antispam-antivirus"><strong>spam</strong></a> campaigns related to airline flights that we&#8217;re highlighting this week:</p>
<ul>
<li><strong>&#8216;Preferred Seat Order&#8217; leads to malware infection.</strong> Patrons of <strong>American Airlines (AA)</strong> were targetted by online criminals via a surge of spam claiming to be &#8220;preferred seat order&#8221; email notifications.  Image and text links on the message body, once clicked, led users to <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=26&amp;y=15"><strong>Blackhole</strong></a>-<strong><a href="http://www.gfi.com/blog/?s=zbot&amp;x=21&amp;y=20">Zbot</a> </strong>system infections.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/02/AA_124_wm.png"><img class="aligncenter size-medium wp-image-10317" title="Screenshot of this AA spam" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/AA_124_wm-291x300.png" alt="" width="291" height="300" /></a><em>click to enlarge</em></p>
<p><a href="http://gfisoftware.tumblr.com/search/american+airlines">This isn&#8217;t the first time spammers banked on AA</a> to get clicks to infection sites. Unfortunately, we don&#8217;t expect this to be the last.</li>
<li><strong>US Airways online reservation spam makes a comeback. </strong>Similar to the AA campaign above, this spam also disguised itself as a notification email. At the time of discovery and writing, we found that users who click links on its message body were directed to pages where a Blackhole exploit code is housed.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/02/USAirways_123_wm.png"><img class="aligncenter size-medium wp-image-10318" title="Screenshot of this US Airways spam" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/USAirways_123_wm-300x218.png" alt="" width="300" height="218" /></a><em>click to enlarge</em></p>
<p>Last known variant of this spam was spotted and documented two months ago.</li>
</ul>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/email-threats-highlights-us-airways-and-american-airlines-spam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Email Threats Highlights: Chase Phish, LinkedIn, American Express Open and Verizon Wireless Spam</title>
		<link>http://www.gfi.com/blog/email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam</link>
		<comments>http://www.gfi.com/blog/email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam/#comments</comments>
		<pubDate>Fri, 25 Jan 2013 15:55:27 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[american express open spam]]></category>
		<category><![CDATA[blackhole exploit]]></category>
		<category><![CDATA[Chase]]></category>
		<category><![CDATA[chase spam]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[linkedin spam]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[verizon spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10213</guid>
		<description><![CDATA[In this week&#8217;s Email Threats roundup, we are highlighting spam and phishing campaigns that have made a comeback, such as LinkedIn and Chase spam, but take advantage of different social engineering lures this time around. You Know It’s Awkward When&#8230;you &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats1.png"><img class="alignleft size-thumbnail wp-image-10214" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats1-150x150.png" alt="" width="150" height="150" /></a>In this week&#8217;s Email Threats roundup, we are highlighting spam and phishing campaigns that have made a comeback, such as <strong>LinkedIn</strong> and <strong>Chase <a href="http://www.gfi.com/products/gfi-mailessentials/">spam</a></strong>, but take advantage of different social engineering lures this time around.</p>
<ul>
<li><strong>You Know It’s Awkward When&#8230;</strong>you receive an email notification that claims to originate from LinkedIn, saying you have an event invitation from one of your employees; however, (1) you don’t own a company and (2) you don’t have people under you that you can call “employees.” Furthermore, isn&#8217;t <strong>LinkedIn Events</strong> the latest <a href="http://help.linkedin.com/app/answers/detail/a_id/1213">thing-of-the-past</a>?
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/LinkedIn_118.png"><img class="aligncenter size-medium wp-image-10215" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/LinkedIn_118-300x199.png" alt="" width="300" height="199" /></a><em>click to enlarge</em></p>
<p>Better steer clear from this spam if you don’t want your system to be prodded by <a href="http://www.gfi.com/blog/?s=exploit&amp;x=21&amp;y=21"><strong>exploits</strong></a>.</p>
<p>Details of this email can be found <a href="http://gfisoftware.tumblr.com/post/40852233046/malicious-linkedin-spam">here</a>.</li>
<li><strong>&#8220;Deb Walden&#8221; Gives Chase to User Information.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/Chase_CP_116.png"><img class="aligncenter size-medium wp-image-10216" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/Chase_CP_116-300x158.png" alt="" width="300" height="158" /></a><em>click to enlarge</em></p>
<p>Online banking clients, be warned: a spam campaign using the names of Chase Bank and its EVP is in the wild. It advises you, the recipient, to verify your online account via an attached file due to “multiple error attempts to access your account online.” For details about this mail, refer <a href="http://gfisoftware.tumblr.com/post/40690037065/chase-online-credentials-phish">here</a>.</p>
<p>Now before rushing to open the attachment so you can quickly regain full access of your account, first of all, please calm down. Receiving a spam like this is no real indication of any attempt to breach your account, especially if the email lacks any markings of legitimacy from its company of origin. Also, never open nor attempt to share the attached file as it calls back to a phishing site.</li>
<li><strong>Fake Transaction, Fake Termination. </strong>It appears that, out of nowhere, <strong>American Express OPEN </strong>has aborted a transaction you don’t remember carrying out. The purported email then advises you to check out the detailed version of the notice to find out how this termination occurred.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/AMEX_116.png"><img class="aligncenter size-medium wp-image-10217" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/AMEX_116-300x247.png" alt="" width="300" height="247" /></a><em>click to enlarge</em></p>
<p>The detailed notice, however, and all the links on the message body, lead only to a page where a <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=14&amp;y=19"><strong>Blackhole Exploit Kit</strong></a> is hosted. If your system is found to be vulnerable, do expect to be alerted by your AV of an attempted Cridex infection. <a href="http://www.vipreantivirus.com/">That is, of course, <em>if</em> you have an updated AV installed.</a></p>
<p>Spam details <a href="http://gfisoftware.tumblr.com/post/40682042750/malicious-american-express-open-spam">here</a>.</li>
<li><strong>This Fake Verizon Mail Looks the Part but Fails to Deliver.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/Verizon_115.png"><img class="aligncenter size-medium wp-image-10218" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/Verizon_115-300x272.png" alt="" width="300" height="272" /></a><em>click to enlarge</em></p>
<p>For one thing, the text in the message body where it&#8217;s supposed to communicate the purpose of why the email was sent doesn&#8217;t make much sense. Confirmation for what? I should visit my Verizon account page because&#8230;?</p>
<p>What matters here is that recipients should not click any of the malicious links in the message body as they lead to serious system infections.</p>
<p>More about this campaign <a href="http://gfisoftware.tumblr.com/post/40603662118/malicious-verizon-wireless-spam">here</a>.</li>
</ul>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Beware: Malicious BT Spam Landing in Inboxes</title>
		<link>http://www.gfi.com/blog/beware-malicious-bt-spam-landing-in-inboxes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beware-malicious-bt-spam-landing-in-inboxes</link>
		<comments>http://www.gfi.com/blog/beware-malicious-bt-spam-landing-in-inboxes/#comments</comments>
		<pubDate>Thu, 24 Jan 2013 17:16:36 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[British Telecom]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10207</guid>
		<description><![CDATA[A quick tip off to our dear readers: if you&#8217;re a client of the BT (British Telecom) Group, be warned that there is a new spam campaign under the guise of a &#8220;Notice of Delivery&#8221; mail pretending to originate from BT &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/bt-spam-ava.png"><img class="alignleft size-thumbnail wp-image-10208" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/bt-spam-ava-150x150.png" alt="" width="150" height="150" /></a>A quick tip off to our dear readers: if you&#8217;re a client of the <strong>BT (British Telecom) Group</strong>, be warned that there is a new <a href="http://www.gfi.com/exchange-server-antispam-antivirus"><strong>spam</strong></a> campaign under the guise of a &#8220;Notice of Delivery&#8221; mail pretending to originate from <a href="http://www.businessdirect.bt.com/"><strong>BT Business Direct</strong></a>. Below is a screenshot of the said email:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/BT_123.png"><img class="aligncenter size-medium wp-image-10210" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/BT_123-254x300.png" alt="" width="254" height="300" /></a><em>click to enlarge</em></p>
<p>Once users download and open the attached HTM file, they are redirected to a Russian website the file calls back to. The website serves a <a href="http://www.vipreantivirus.com/"><strong>Blackhole Exploit Kit</strong></a>, which then downloads <strong><a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0">Cridex</a> </strong>once it finds a software vulnerability.</p>
<p>You can find details of the spam email in this <a href="http://gfisoftware.tumblr.com/post/41277073286/british-telecom-order-notice-attachment-spam">GFI Software Tumblr blog entry</a>.</p>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/beware-malicious-bt-spam-landing-in-inboxes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fake Adobe Flash Updates Resurface on the Web</title>
		<link>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-adobe-flash-updates-resurfaces-in-the-web</link>
		<comments>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/#comments</comments>
		<pubDate>Thu, 24 Jan 2013 15:32:29 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[BBB]]></category>
		<category><![CDATA[Better Business Bureau]]></category>
		<category><![CDATA[eFax]]></category>
		<category><![CDATA[efax corporate]]></category>
		<category><![CDATA[fake adobe flash player]]></category>
		<category><![CDATA[fake google chrome]]></category>
		<category><![CDATA[pony downloader]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10198</guid>
		<description><![CDATA[Following the return of fake Google Chrome browser updates almost two weeks ago, online criminals are now banking on fake Adobe Flash Player updates to lure the unwary user into downloading malware onto their system. Matthew and Robert, two of our &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/fake-flash-logo-avatar.png"><img class="alignleft size-thumbnail wp-image-10199" style="border: 0px; margin: 10px;" title="Fake Adobe Flash Player Update" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/fake-flash-logo-avatar-150x150.png" alt="" width="150" height="150" /></a>Following the return of <a href="http://www.gfi.com/blog/fake-google-chrome-updates-return/">fake <strong>Google Chrome</strong> browser updates</a> almost two weeks ago, online criminals are now banking on fake <strong>Adobe Flash Player</strong> updates to lure the unwary user into downloading malware onto their system.</p>
<p>Matthew and Robert, two of our researchers in the AV Labs, discovered this upon digging deeper into spam emails claiming to be from the <a href="http://gfisoftware.tumblr.com/post/41205966325/ny-better-business-bureau-attachment-spam"><strong>Better Business Bureau (BBB)</strong></a> and <strong><a href="http://gfisoftware.tumblr.com/post/41285616866/efax-corporate-message-spam">eFax Corporate</a>. </strong>Complete email details of these spam have documented in our <a href="http://gfisoftware.tumblr.com/">GFI Software Tumblr site</a>.</p>
<p>The BBB email contains an attachment that is found to be a <a href="http://www.vipreantivirus.com/"><strong>Pony downloader</strong></a> that, once opened, downloads a variant of the <a href="http://www.gfi.com/blog/?s=zeus&amp;x=17&amp;y=19"><strong>ZeuS</strong></a> banking Trojan onto the affected user&#8217;s system. The said downloader also steals various passwords related to FTP sites.</p>
<p>One of the URLs that the Pony downloader calls back to is a domain served on the IP address <em>74(dot)91(dot)117(dot)49</em>, which is found to host other malicious files like the <a href="http://threatpost.com/en_us/blogs/black-hole-exploit-kit-20-released-091212"><strong>Blackhole Exploit Kit 2.0</strong></a>, <a href="http://blogs.technet.com/b/mmpc/archive/2012/09/10/msrt-september-12-medfos-hijacking-your-daily-search.aspx"><strong>Medfos</strong></a> (a Trojan downloader that hijacks search results), the <strong>Simda rootkit</strong>, the <a href="http://malwareprotectioncenter.com/2011/07/16/personal-shield-pro-rogue-of-the-winweb-security-family/"><strong>WinWeb Security</strong></a> <a href="http://malwareprotectioncenter.com/"><strong>rogue AV</strong></a>, and ZeuS.</p>
<p>The following compromised domains are found to be hosted on the above IP:</p>
<ul>
<li>13(dot)carnovirious(dot)net</li>
<li>13(dot)blumotorada(dot)net</li>
<li>13(dot)lomerdaster(dot)net</li>
<li>13(dot)jonemnominik(dot)net</li>
<li>13(dot)zabakarvester(dot)net<span style="text-align: center;"> </span></li>
</ul>
<p style="text-align: left;">Below is a sample screenshot of one of the compromised sites hosting the fake Google Chrome update:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-chrome.png"><img class="aligncenter size-medium wp-image-10201" title="Screenshot of fake Google Chrome update page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-chrome-300x215.png" alt="" width="300" height="215" /></a><em>click to enlarge</em></p>
<p>And here is a sample screenshot of the malicious IP hosting a fake Adobe Flash Player update:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-flash.png"><img class="aligncenter size-medium wp-image-10202" title="Screenshot of the fake Adobe Flash Update page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-flash-300x167.png" alt="" width="300" height="167" /></a><em>click to enlarge</em></p>
<p>When it comes to updating software installed in your systems, it is still best to visit their official websites. Free update checkers, such as the FileHippo program, can also assist users in managing software that needs updating in real-time.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/">ADP Spam Campaigns are in the Wild</a></li>
<li><a href="http://www.gfi.com/blog/this-spam-gives-recipients-a-second-chance/">This Spam Gives Recipients a Second Chance</a></li>
<li><a href="http://www.gfi.com/blog/news-of-brazils-former-presidents-death-leads-to-malware/">News of Brazil’s Former President’s Death Leads to Malware</a></li>
<li><a href="http://www.gfi.com/blog/fake-flash-player-fun/">Fake Flash Player Fun</a></li>
</ul>
<p>Jovi Umawing (Thanks to Matthew and Robert)</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Malware Masks as Latest Java Update</title>
		<link>http://www.gfi.com/blog/malware-masks-as-latest-java-update/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-masks-as-latest-java-update</link>
		<comments>http://www.gfi.com/blog/malware-masks-as-latest-java-update/#comments</comments>
		<pubDate>Mon, 21 Jan 2013 13:16:57 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cool]]></category>
		<category><![CDATA[disable java]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploit kits]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[nuclear pack]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[redkit]]></category>
		<category><![CDATA[software patch]]></category>
		<category><![CDATA[software update]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10166</guid>
		<description><![CDATA[In case you have been out of touch with the latest news on software vulnerability, security experts have discovered a new zero-day, critical flaw on Java not so long ago and is already integrated into popular exploit kits, such as Blackhole, Redkit, &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/java-update.png"><img class="alignleft size-thumbnail wp-image-10167" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/java-update-150x150.png" alt="" width="150" height="150" /></a>In case you have been out of touch with the latest news on software vulnerability, security experts have discovered <a href="http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html">a new zero-day, critical flaw on <strong>Java</strong></a> not so long ago and is already integrated into popular <strong>exploit kits</strong>, such as <strong>Blackhole</strong>, <strong>Redkit</strong>, <strong>Cool</strong> and <strong>Nuclear Pack</strong>. The said flaw, once exploited, is said to allow remote code execution on a target system without authentication from the user. This, of course, gives malware files the upper hand if users visit sites/URLs where they are hosted.</p>
<p>Immediately after the vulnerability is found, <strong>Oracle</strong> has released its patch. Despite this speedy response from the company, many security experts have already began advising users to just forget <a href="http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html">the patch</a> and disable Java in their browsers.</p>
<p>Perhaps some users have already made <a href="http://krebsonsecurity.com/how-to-unplug-java-from-the-browser/">the move of disabling Java</a> entirely, or perhaps some users have opted still to apply the patch. If you belong in the former group, latter group, let this be our reminder to you: Please <a href="http://java.com/en/download/index.jsp">make sure that you&#8217;re downloading the patch straight from the Oracle website</a> and nowhere else because it&#8217;s highly likely that what you may be installing onto your system is <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/malware-poses-as-an-update-for-java-0-day-fix/">malware</a>.</p>
<p>The GFI Labs Team</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/malware-masks-as-latest-java-update/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Email Threats Highlights: EFTPS, BBB and Federal Reserve Spam</title>
		<link>http://www.gfi.com/blog/email-threats-highlights-eftps-bbb-and-federal-reserve-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-threats-highlights-eftps-bbb-and-federal-reserve-spam</link>
		<comments>http://www.gfi.com/blog/email-threats-highlights-eftps-bbb-and-federal-reserve-spam/#comments</comments>
		<pubDate>Wed, 16 Jan 2013 06:42:45 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[BBB]]></category>
		<category><![CDATA[Better Business Bureau]]></category>
		<category><![CDATA[blackhole exploit kit]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[eftps]]></category>
		<category><![CDATA[Electronic Federal Tax Payment System]]></category>
		<category><![CDATA[fed]]></category>
		<category><![CDATA[federal reserve]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10141</guid>
		<description><![CDATA[Researchers in the AV Labs have captured and recorded a number of notable email threats last week—generally spam related to malware—that we have discussed in brief below: Fake BBB Complaints Spam Can Unsettle Businesses. This spam lets recipients know that &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats.png"><img class="alignleft size-thumbnail wp-image-10142" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats-150x150.png" alt="" width="150" height="150" /></a> Researchers in the AV Labs <a href="http://gfisoftware.tumblr.com/">have captured and recorded</a> a number of notable email threats last week—generally <a href="http://www.gfi.com/exchange-server-antispam-antivirus"><strong>spam </strong></a>related to <a href="http://www.vipreantivirus.com/"><strong>malware</strong></a>—that we have discussed in brief below:</p>
<ul>
<li><strong>Fake BBB Complaints Spam Can Unsettle Businesses</strong>. This spam lets recipients know that the <a href="http://www.gfi.com/blog/?s=better+business+bureau&amp;x=0&amp;y=0"><strong>Better Business Bureau</strong></a>, or <strong>BBB</strong>, has purportedly received a &#8220;complaint of uneasiness&#8221; from one of recipient&#8217;s clients. Details are deliberately not disclosed in the email body but points to a link recipients can refer to for details. The link does not lead to any details that may shed light on the matter at hand, however; instead, recipients are redirected to a URL where a <strong><a href="http://www.gfi.com/blog/?s=blackhole+exploit&amp;x=0&amp;y=0">Blackhole Exploit Kit</a> </strong>awaits.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/01-bbb-complaint.png"><img class="aligncenter size-medium wp-image-10143" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/01-bbb-complaint-300x217.png" alt="" width="300" height="217" /></a><em>click to enlarge</em></p>
<p><a href="http://gfisoftware.tumblr.com/post/38961508459/bbb-grievance-report-spam">A previous sample</a> of this spam is found to contain a link where an information stealer can be downloaded onto systems.</li>
<li><strong>Fake EFTPS Spam is Equal Parts Unsettling for Businesses <em>and</em> Workers.</strong> If there is probably one thing payroll processors do not want to hear, it&#8217;s payroll issues. Receiving a notice from the <strong>Electronic Federal Tax Payment System</strong>, or <strong>EFTPS</strong>, that a supposed payroll batch has been declined may cause more than just dissatisfied employees: details and contact links in the email body of this spam lead to a <strong><a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0">Cridex</a> </strong>system infection.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/02-eftpa-decline-spam.png"><img class="aligncenter size-medium wp-image-10144" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/02-eftpa-decline-spam-300x145.png" alt="" width="300" height="145" /></a><em>click to enlarge</em></p>
</li>
<li><strong>Spammers Lead FedMail ACH Spam Recipients to Cridex.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/03-fedmail-announcement.png"><img class="aligncenter size-medium wp-image-10145" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/03-fedmail-announcement-300x120.png" alt="" width="300" height="120" /></a><em>click to enlarge</em></p>
<p>A hint of urgency in this fake Federal Reserve System email, considering it pretends to originate from <em>the</em> central banking system of the United States, may allow someone to click the link without thinking because, well, it&#8217;s &#8220;only&#8221; an announcement. But when it comes to fooling people via email, one has to understand that the more inconspicuous it might appear or sound on the outside, the more one has to be careful in dealing with it. This spam is no different and must be handled with caution.</li>
</ul>
<p>Users are advised to mark the above email threats as spam if they&#8217;re found in their inbox and then/or simply delete them.</p>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/email-threats-highlights-eftps-bbb-and-federal-reserve-spam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fake Google Chrome Updates Return</title>
		<link>http://www.gfi.com/blog/fake-google-chrome-updates-return/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-google-chrome-updates-return</link>
		<comments>http://www.gfi.com/blog/fake-google-chrome-updates-return/#comments</comments>
		<pubDate>Fri, 11 Jan 2013 09:10:38 +0000</pubDate>
		<dc:creator>Chris Boyd</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[chrome update]]></category>
		<category><![CDATA[fake]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[stealer]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10118</guid>
		<description><![CDATA[&#8220;Oh hey, a new Chrome update! I&#8217;d better hurry up and download the file from this random website with no apparent connection to anything remotely related to my web browser&#8221;. There are things better left unsaid, and the above is &#8230;]]></description>
				<content:encoded><![CDATA[<p>&#8220;Oh hey, a new Chrome update! I&#8217;d better hurry up and download the file from this random website with no apparent connection to anything remotely related to my web browser&#8221;.</p>
<p>There are things better left unsaid, and the above is probably floating around near the top somewhere. A scam from a few months ago &#8211; <a href="http://forums.anvisoft.com/viewtopic-46-1966-0.html">fake Chrome update websites leading to Malware</a> &#8211; has returned and is <a href="http://www.mywot.com/en/scorecard/11.lamarianella.info/comment-58095257?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+WOTWebOfTrustScorecard-Comments+(WOT+Web+of+Trust+scorecard+-+Comments)#comment-58095257">currently turning heads</a>.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake1.jpg"><img class="aligncenter size-medium wp-image-10120" style="border: 0px; margin: 10px;" title="Amazingly enough, this is not a real Chrome update" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake1-300x229.jpg" alt="" width="300" height="229" /></a></p>
<p>Click to Enlarge</p>
<p>The design of the website is identical to the initial rollout, urging the end-user to &#8220;Update Google Chrome: To make sure that you&#8217;re protected by the latest security updates&#8221;.</p>
<p>If you attempt to download the file while using Chrome, the following prompt appears quicker than Christopher Nolan can make a movie about it:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake2.jpg"><img class="aligncenter size-full wp-image-10119" style="border: 0px; margin: 10px;" title="You'll just have to imagine the Inception horns." src="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake2.jpg" alt="" width="264" height="57" /></a></p>
<p>GOOD ADVICE, CHROME.</p>
<p>The file itself has been around for a while, being seen on around 14 or so websites since around October and is listed at <a href="http://malwr.com/analysis/ab5ec8f2acd42b635a79503701eb5d41/">Malwr.com</a> which mentions attempts to access Firefox&#8217;s Password Manager local database &#8211; meanwhile, it&#8217;s listed on the comments section of VirusTotal as being <a href="https://www.virustotal.com/file/19d087ddaadf8fc3d5b8a422dc303e6ea6cdac2a55b4b14e9f28aec9c8902439/analysis/">capable of stealing banking credentials</a>. You&#8217;ll notice they mention Zeus &#8211; indeed, one of the DNS requests made is to a site by the Malware is related to <a href="http://www.mywot.com/en/scorecard/q.e-tecinnovation.co.uk/comment-51266769#comment-51266769">ZBot / Blackhole exploit kit attacks</a>. In fact, it seems to want to swipe information of a very similar nature to a ZBot infection from August of 2012 detailed on the <a href="http://blog.shadowserver.org/2012/08/14/beware-the-trolls-secure-your-trackers/">ShadowServer Blog</a> (scroll down to the &#8220;data it tries to collect and steal&#8221;).</p>
<p>Put simply, you don&#8217;t want this anywhere near your computer and users of Chrome curious about updates should simply read the information on the <a href="http://support.google.com/chrome/bin/answer.py?hl=en&amp;answer=95414">relevant Google Chrome support page</a>. <a href="http://www.vipreantivirus.com/">VIPRE Antivirus</a> detects this threat as Trojan.Win32.Cleaman.aj (v).</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/fake-google-chrome-updates-return/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>LinkedIn Spam: The Repeat</title>
		<link>http://www.gfi.com/blog/linkedin-spam-the-repeat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linkedin-spam-the-repeat</link>
		<comments>http://www.gfi.com/blog/linkedin-spam-the-repeat/#comments</comments>
		<pubDate>Wed, 19 Dec 2012 14:10:21 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10045</guid>
		<description><![CDATA[Another slew of spam claiming to originate from LinkedIn has hit the wild Internet in less than 24 hours, according to the real time recording and tracking of email threats by our researchers in the AV Labs. The malicious spam, this time, poses &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol.png"><img class="alignleft size-thumbnail wp-image-10046" style="border: 0px; margin: 10px;" title="Mohawked &quot;at&quot; symbol" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol-150x150.png" alt="" width="150" height="150" /></a>Another slew of <a href="http://www.gfi.com/products/gfi-mailessentials/pricing#overview"><strong>spam</strong></a> claiming to originate from <strong>LinkedIn </strong>has<strong> </strong>hit the wild Internet in less than 24 hours, <a href="http://gfisoftware.tumblr.com/post/38238165249/malicious-linkedin-invitation-spam-returns">according</a> to the <a href="http://gfisoftware.tumblr.com/">real time recording and tracking of email threats</a> by our researchers in the AV Labs.</p>
<p>The malicious spam, this time, poses a question then gives a less-than-stellar answer to it, something criminals are counting on that recipients may simply accept and believe. Well, we better not take their word for it.</p>
<p>Here&#8217;s what the email looks like:</p>
<p style="text-align: center;"><em><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm.png"><img class="aligncenter size-medium wp-image-10050" title="Screenshot of LinkedIn spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm-300x169.png" alt="" width="300" height="169" /></a>click to enlarge</em></p>
<blockquote><p><strong>From:</strong> {bogus email address}<br />
<strong>To:</strong> {random}<br />
<strong>Subject:</strong> Join my network on LinkedIn<br />
<strong>Message body:</strong><br />
{redacted} has indicated you are a Friend</p>
<p>I’d like to add you to my professional network on LinkedIn.</p>
<p>[Allow button] View invitation from {redacted}</p>
<p>WHY MIGHT CONNECTING WITH {redacted} BE A GOOD IDEA?</p>
<p>{redacted} connections could be useful to you</p>
<p>After accepting {redacted} invitation, check {redacted} connections to see who else you may know and who you might want an introduction to. Building these connections can create opportunities in the future.</p></blockquote>
<p>Clicking the <em>Allow</em> button or the link on the message body directs users to several Web pages of compromised sites, which all look like this<span style="line-height: 24px; font-size: medium;">:</span></p>
<p style="text-align: center;"><span style="font-size: medium;"><span style="line-height: 24px;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm.png"><img class="aligncenter size-medium wp-image-10048" title="Hello, Stranger--NOT!" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm-300x105.png" alt="" width="300" height="105" /></a></span></span><em><span style="line-height: 24px; font-size: medium;">click to enlarge</span></em></p>
<p>This page laced with the <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=27&amp;y=14"><strong>Blackhole Exploit Kit</strong></a> code then auto-redirects users to a Russian website where the <a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0"><strong>Cridex</strong></a> info-stealer payload can be downloaded.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm.png"><img class="aligncenter size-medium wp-image-10049" title="Would you like a Java with that?" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm-300x131.png" alt="" width="300" height="131" /></a><em>click to enlarge</em></p>
<p>Like we&#8217;ve said before, when in doubt, users should simply visit their LinkedIn pages and check their profile mailbox for invites.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/fake-linkedin-mails-lead-to-cridex/">Fake LinkedIn Mails Lead To Cridex</a></li>
<li><a href="http://www.gfi.com/blog/new-phishing-campaign-targets-linkedin-users-with-fake-reminders/">New Phishing Campaign Targets LinkedIn Users with Fake Reminders</a></li>
<li><a href="http://www.gfi.com/blog/zeus-linkedin-mails-still-out-for-delivery/">Zeus LinkedIn mails still out for delivery</a></li>
</ul>
<p>Jovi Umawing (Thanks to the GFI Labs team)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/linkedin-spam-the-repeat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-6</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 17:18:59 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[adobe cs]]></category>
		<category><![CDATA[adobe cs4]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[citi credit card]]></category>
		<category><![CDATA[CitiBank]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[mailbox upgrade]]></category>
		<category><![CDATA[microsoft outlook]]></category>
		<category><![CDATA[outlook express]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10038</guid>
		<description><![CDATA[Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14. &#8220;Mailbox Upgrade&#8221; Email is a Phish. If you&#8217;re using Microsoft Outlook or Outlook Express, I&#8217;m sure you&#8217;re familiar &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2.png"><img class="alignleft size-thumbnail wp-image-10039" style="border: 0px; margin: 10px;" title="Email Threats for the Week (December 10 - 14)" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2-150x150.png" alt="" width="150" height="150" /></a> Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14.</p>
<ul>
<li><strong>&#8220;Mailbox Upgrade&#8221; Email is a Phish. </strong>If you&#8217;re using <strong>Microsoft Outlook</strong> or <strong>Outlook Express</strong>, I&#8217;m sure you&#8217;re familiar with this kind of email landing in our inboxes, especially if IT has set a limit of how much your inbox can carry.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm.png"><img class="aligncenter size-medium wp-image-10042" title="Phishing spam supposedly sent by one &quot;Margaret Colleluori&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm-300x132.png" alt="" width="300" height="132" /></a><em>click to enlarge</em></p>
<p>First off, let me point out two things: one, 20GB of email space is too huge to be believable, and IT normally sets the limit of 2GB; two, IT does not tell their email users to validate anything. What they normally advise is to delete emails or move them to another location to free up space. Users who click the link on the mail is led to a phishing page. Reference <a href="http://gfisoftware.tumblr.com/post/37643320589/e-mail-credentials-phish">here</a>.</li>
<li><strong>Unsolicited &#8220;Adobe CS4 License&#8221; Leads to Malware.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm.png"><img class="aligncenter size-medium wp-image-10043" title="Spam of fake Adobe CS4 license" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm-300x161.png" alt="" width="300" height="161" /></a><em>click to enlarge</em></p>
<p>I wish there won&#8217;t be takers for any outdated Adobe CS4 license any time soon, much less a bogus one.  This leads to a <strong><a href="http://www.gfi.com/blog/?s=blackhole&amp;x=0&amp;y=0">Blackhole</a>-<a href="http://www.gfi.com/blog/?s=cridex&amp;x=16&amp;y=8">Cridex</a></strong> system infection. Details <a href="http://gfisoftware.tumblr.com/post/37791588782/adobe-indesign-cs4-license-spam-returns">here</a>.</li>
<li><strong>Spammers Target Citibank Clients.</strong> Citibank credit card users are recently targeted by this spam circulating in the wild, claiming to be their <strong>Citi Credit Card</strong> statement. Users who click any of the links, unfortunately, may suddenly find their systems infected with the <strong><a href="http://www.gfi.com/blog/?s=zeus&amp;x=0&amp;y=0">Zbot/ZeuS</a></strong> banking Trojan. More <a href="http://gfisoftware.tumblr.com/post/37830503278/malicious-citibank-credit-card-statement-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm.png"><img class="aligncenter size-medium wp-image-10044" title="Bogus Citi Credit Card spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm-300x220.png" alt="" width="300" height="220" /></a><em>click to enlarge</em></p>
</li>
</ul>
<p>If you come across any of these spam emails, it&#8217;s best to simply delete them from your inbox.</p>
<p>Stay safe!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-5/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-5</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-5/#comments</comments>
		<pubDate>Mon, 10 Dec 2012 16:59:23 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[aicpa]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[department of investigation]]></category>
		<category><![CDATA[FedEx]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[socl]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[TLO]]></category>
		<category><![CDATA[upx]]></category>
		<category><![CDATA[wells fargo]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9993</guid>
		<description><![CDATA[Below are our noteworthy email threats for the week of December three to seven: Phishers Target Wells Fargo Clients. Emails from banks claiming that they are unable to verify their client details (&#8220;Regarding what? Didn&#8217;t say, of course.&#8221;) and then &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats1.png"><img class="alignleft size-thumbnail wp-image-9994" style="border: 0px; margin: 10px;" title="December 3 to 7 Email Threats" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats1-150x150.png" alt="" width="150" height="150" /></a></p>
<p>Below are our noteworthy email threats for the week of December three to seven:</p>
<ul>
<li><strong>Phishers Target <a href="http://www.gfi.com/blog/?s=wells+fargo&amp;x=0&amp;y=0">Wells Fargo</a> Clients.</strong> Emails from banks claiming that they are unable to verify their client details (&#8220;Regarding what? Didn&#8217;t say, of course.&#8221;) and then pointing them to a URL where they can confirm their details online should be treated with disdain and must be banished into the the fiery pits of the <em>Trash</em> folder, never to be seen again. More <a href="http://gfisoftware.tumblr.com/post/37284367518/wells-fargo-credentials-phish">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/wellsfargo.png"><img class="aligncenter size-medium wp-image-10002" title="Wells Fargo spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/wellsfargo-300x186.png" alt="" width="300" height="186" /></a><em>click to enlarge</em></p>
</li>
<li><strong>A Short and Sweet Message from the Department of Investigations </strong>can perhaps make anyone&#8217;s blood freeze for a second or two due to intimidation. But recipients of this spam must snap out of it quick since the vagueness of the message should set off something in their heads.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/TLO.png"><img class="aligncenter size-medium wp-image-10003" title="TLO spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/TLO-300x153.png" alt="" width="300" height="153" /></a><em>click to enlarge</em></p>
<p>Clicking the link on the message body allows users to download <strong><a href="http://www.gfi.com/blog/?s=cridex&amp;x=18&amp;y=20">Cridex</a></strong>. Details <a href="http://gfisoftware.tumblr.com/post/37112933060/account-has-been-blocked">here</a>.</li>
<li><strong><a href="http://www.gfi.com/blog/?s=amazon&amp;x=23&amp;y=16">Amazon</a> eBook Spam in the Wild.</strong> It&#8217;s back and it&#8217;s persistent. Spammers behind this malicious spam haven&#8217;t given up on this type of social engineering just yet. Users who click any of the links on the message body may also be infected with Cridex. Check this out <a href="http://gfisoftware.tumblr.com/post/37259744436/malicious-amazon-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/amazon.png"><img class="aligncenter size-medium wp-image-10004" title="Amazon spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/amazon-300x266.png" alt="" width="300" height="266" /></a><em>click to enlarge</em></p>
</li>
<li><strong>Spam Pretends to Come from <a href="http://www.gfi.com/blog/?s=aicpa&amp;x=0&amp;y=0">AICPA</a>.</strong> The <strong>American Institute of CPAs</strong> won&#8217;t be happy about the fact that another slew of spam carrying its name is again making rounds in the Web. <a href="http://www.gfi.com/blog/fake-aicpa-mail-serves-blackholes-and-rootkits/">An earlier variant of this spam</a>, which is found in February of this year, is known to have <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=0&amp;y=0"><strong>Blackhole exploit kits</strong></a> and <a href="http://www.gfi.com/blog/?s=rootkit&amp;x=0&amp;y=0"><strong>rootkits</strong></a> in tow. This variant, however, has Cridex. Details <a href="http://gfisoftware.tumblr.com/post/37410130197/malicious-american-institute-of-cpas-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/AICPA.png"><img class="aligncenter size-medium wp-image-10005" title="AICPA spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/AICPA-300x214.png" alt="" width="300" height="214" /></a><em>click to enlarge</em></p>
</li>
</ul>
<p>We have also highlighted the following spam we found last week that you may also want to check out:</p>
<ul>
<li><a href="http://www.gfi.com/blog/fake-paypal-emails-windows-8-and-vintage-photo-collections/">Fake PayPal Emails: Windows 8 and Vintage Photo Collections</a></li>
<li><a href="http://www.gfi.com/blog/spam-gets-socl/">Spam gets Socl</a></li>
<li><a href="http://www.gfi.com/blog/fake-delivery-notification-gets-confused-has-nice-lie-down/">Fake delivery notification gets confused, has nice lie down</a></li>
</ul>
<p>Stay safe!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-5/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 17:11:59 by W3 Total Cache --