<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Search Results  &#187;  cridex</title>
	<atom:link href="http://www.gfi.com/blog/search/cridex/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Email Threats Highlights: Chase Phish, LinkedIn, American Express Open and Verizon Wireless Spam</title>
		<link>http://www.gfi.com/blog/email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam</link>
		<comments>http://www.gfi.com/blog/email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam/#comments</comments>
		<pubDate>Fri, 25 Jan 2013 15:55:27 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[american express open spam]]></category>
		<category><![CDATA[blackhole exploit]]></category>
		<category><![CDATA[Chase]]></category>
		<category><![CDATA[chase spam]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[linkedin spam]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[verizon spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10213</guid>
		<description><![CDATA[In this week&#8217;s Email Threats roundup, we are highlighting spam and phishing campaigns that have made a comeback, such as LinkedIn and Chase spam, but take advantage of different social engineering lures this time around. You Know It’s Awkward When&#8230;you &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats1.png"><img class="alignleft size-thumbnail wp-image-10214" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats1-150x150.png" alt="" width="150" height="150" /></a>In this week&#8217;s Email Threats roundup, we are highlighting spam and phishing campaigns that have made a comeback, such as <strong>LinkedIn</strong> and <strong>Chase <a href="http://www.gfi.com/products/gfi-mailessentials/">spam</a></strong>, but take advantage of different social engineering lures this time around.</p>
<ul>
<li><strong>You Know It’s Awkward When&#8230;</strong>you receive an email notification that claims to originate from LinkedIn, saying you have an event invitation from one of your employees; however, (1) you don’t own a company and (2) you don’t have people under you that you can call “employees.” Furthermore, isn&#8217;t <strong>LinkedIn Events</strong> the latest <a href="http://help.linkedin.com/app/answers/detail/a_id/1213">thing-of-the-past</a>?
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/LinkedIn_118.png"><img class="aligncenter size-medium wp-image-10215" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/LinkedIn_118-300x199.png" alt="" width="300" height="199" /></a><em>click to enlarge</em></p>
<p>Better steer clear from this spam if you don’t want your system to be prodded by <a href="http://www.gfi.com/blog/?s=exploit&amp;x=21&amp;y=21"><strong>exploits</strong></a>.</p>
<p>Details of this email can be found <a href="http://gfisoftware.tumblr.com/post/40852233046/malicious-linkedin-spam">here</a>.</li>
<li><strong>&#8220;Deb Walden&#8221; Gives Chase to User Information.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/Chase_CP_116.png"><img class="aligncenter size-medium wp-image-10216" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/Chase_CP_116-300x158.png" alt="" width="300" height="158" /></a><em>click to enlarge</em></p>
<p>Online banking clients, be warned: a spam campaign using the names of Chase Bank and its EVP is in the wild. It advises you, the recipient, to verify your online account via an attached file due to “multiple error attempts to access your account online.” For details about this mail, refer <a href="http://gfisoftware.tumblr.com/post/40690037065/chase-online-credentials-phish">here</a>.</p>
<p>Now before rushing to open the attachment so you can quickly regain full access of your account, first of all, please calm down. Receiving a spam like this is no real indication of any attempt to breach your account, especially if the email lacks any markings of legitimacy from its company of origin. Also, never open nor attempt to share the attached file as it calls back to a phishing site.</li>
<li><strong>Fake Transaction, Fake Termination. </strong>It appears that, out of nowhere, <strong>American Express OPEN </strong>has aborted a transaction you don’t remember carrying out. The purported email then advises you to check out the detailed version of the notice to find out how this termination occurred.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/AMEX_116.png"><img class="aligncenter size-medium wp-image-10217" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/AMEX_116-300x247.png" alt="" width="300" height="247" /></a><em>click to enlarge</em></p>
<p>The detailed notice, however, and all the links on the message body, lead only to a page where a <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=14&amp;y=19"><strong>Blackhole Exploit Kit</strong></a> is hosted. If your system is found to be vulnerable, do expect to be alerted by your AV of an attempted Cridex infection. <a href="http://www.vipreantivirus.com/">That is, of course, <em>if</em> you have an updated AV installed.</a></p>
<p>Spam details <a href="http://gfisoftware.tumblr.com/post/40682042750/malicious-american-express-open-spam">here</a>.</li>
<li><strong>This Fake Verizon Mail Looks the Part but Fails to Deliver.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/Verizon_115.png"><img class="aligncenter size-medium wp-image-10218" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/Verizon_115-300x272.png" alt="" width="300" height="272" /></a><em>click to enlarge</em></p>
<p>For one thing, the text in the message body where it&#8217;s supposed to communicate the purpose of why the email was sent doesn&#8217;t make much sense. Confirmation for what? I should visit my Verizon account page because&#8230;?</p>
<p>What matters here is that recipients should not click any of the malicious links in the message body as they lead to serious system infections.</p>
<p>More about this campaign <a href="http://gfisoftware.tumblr.com/post/40603662118/malicious-verizon-wireless-spam">here</a>.</li>
</ul>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/email-threats-highlights-chase-phish-linkedin-american-express-open-and-verizon-wireless-spam/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Beware: Malicious BT Spam Landing in Inboxes</title>
		<link>http://www.gfi.com/blog/beware-malicious-bt-spam-landing-in-inboxes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beware-malicious-bt-spam-landing-in-inboxes</link>
		<comments>http://www.gfi.com/blog/beware-malicious-bt-spam-landing-in-inboxes/#comments</comments>
		<pubDate>Thu, 24 Jan 2013 17:16:36 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[British Telecom]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10207</guid>
		<description><![CDATA[A quick tip off to our dear readers: if you&#8217;re a client of the BT (British Telecom) Group, be warned that there is a new spam campaign under the guise of a &#8220;Notice of Delivery&#8221; mail pretending to originate from BT &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/bt-spam-ava.png"><img class="alignleft size-thumbnail wp-image-10208" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/bt-spam-ava-150x150.png" alt="" width="150" height="150" /></a>A quick tip off to our dear readers: if you&#8217;re a client of the <strong>BT (British Telecom) Group</strong>, be warned that there is a new <a href="http://www.gfi.com/exchange-server-antispam-antivirus"><strong>spam</strong></a> campaign under the guise of a &#8220;Notice of Delivery&#8221; mail pretending to originate from <a href="http://www.businessdirect.bt.com/"><strong>BT Business Direct</strong></a>. Below is a screenshot of the said email:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/BT_123.png"><img class="aligncenter size-medium wp-image-10210" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/BT_123-254x300.png" alt="" width="254" height="300" /></a><em>click to enlarge</em></p>
<p>Once users download and open the attached HTM file, they are redirected to a Russian website the file calls back to. The website serves a <a href="http://www.vipreantivirus.com/"><strong>Blackhole Exploit Kit</strong></a>, which then downloads <strong><a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0">Cridex</a> </strong>once it finds a software vulnerability.</p>
<p>You can find details of the spam email in this <a href="http://gfisoftware.tumblr.com/post/41277073286/british-telecom-order-notice-attachment-spam">GFI Software Tumblr blog entry</a>.</p>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/beware-malicious-bt-spam-landing-in-inboxes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Email Threats Highlights: EFTPS, BBB and Federal Reserve Spam</title>
		<link>http://www.gfi.com/blog/email-threats-highlights-eftps-bbb-and-federal-reserve-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-threats-highlights-eftps-bbb-and-federal-reserve-spam</link>
		<comments>http://www.gfi.com/blog/email-threats-highlights-eftps-bbb-and-federal-reserve-spam/#comments</comments>
		<pubDate>Wed, 16 Jan 2013 06:42:45 +0000</pubDate>
		<dc:creator>GFI Labs Team</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[BBB]]></category>
		<category><![CDATA[Better Business Bureau]]></category>
		<category><![CDATA[blackhole exploit kit]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[eftps]]></category>
		<category><![CDATA[Electronic Federal Tax Payment System]]></category>
		<category><![CDATA[fed]]></category>
		<category><![CDATA[federal reserve]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10141</guid>
		<description><![CDATA[Researchers in the AV Labs have captured and recorded a number of notable email threats last week—generally spam related to malware—that we have discussed in brief below: Fake BBB Complaints Spam Can Unsettle Businesses. This spam lets recipients know that &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats.png"><img class="alignleft size-thumbnail wp-image-10142" style="border: 0px; margin: 10px;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/email-threats-150x150.png" alt="" width="150" height="150" /></a> Researchers in the AV Labs <a href="http://gfisoftware.tumblr.com/">have captured and recorded</a> a number of notable email threats last week—generally <a href="http://www.gfi.com/exchange-server-antispam-antivirus"><strong>spam </strong></a>related to <a href="http://www.vipreantivirus.com/"><strong>malware</strong></a>—that we have discussed in brief below:</p>
<ul>
<li><strong>Fake BBB Complaints Spam Can Unsettle Businesses</strong>. This spam lets recipients know that the <a href="http://www.gfi.com/blog/?s=better+business+bureau&amp;x=0&amp;y=0"><strong>Better Business Bureau</strong></a>, or <strong>BBB</strong>, has purportedly received a &#8220;complaint of uneasiness&#8221; from one of recipient&#8217;s clients. Details are deliberately not disclosed in the email body but points to a link recipients can refer to for details. The link does not lead to any details that may shed light on the matter at hand, however; instead, recipients are redirected to a URL where a <strong><a href="http://www.gfi.com/blog/?s=blackhole+exploit&amp;x=0&amp;y=0">Blackhole Exploit Kit</a> </strong>awaits.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/01-bbb-complaint.png"><img class="aligncenter size-medium wp-image-10143" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/01-bbb-complaint-300x217.png" alt="" width="300" height="217" /></a><em>click to enlarge</em></p>
<p><a href="http://gfisoftware.tumblr.com/post/38961508459/bbb-grievance-report-spam">A previous sample</a> of this spam is found to contain a link where an information stealer can be downloaded onto systems.</li>
<li><strong>Fake EFTPS Spam is Equal Parts Unsettling for Businesses <em>and</em> Workers.</strong> If there is probably one thing payroll processors do not want to hear, it&#8217;s payroll issues. Receiving a notice from the <strong>Electronic Federal Tax Payment System</strong>, or <strong>EFTPS</strong>, that a supposed payroll batch has been declined may cause more than just dissatisfied employees: details and contact links in the email body of this spam lead to a <strong><a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0">Cridex</a> </strong>system infection.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/02-eftpa-decline-spam.png"><img class="aligncenter size-medium wp-image-10144" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/02-eftpa-decline-spam-300x145.png" alt="" width="300" height="145" /></a><em>click to enlarge</em></p>
</li>
<li><strong>Spammers Lead FedMail ACH Spam Recipients to Cridex.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/03-fedmail-announcement.png"><img class="aligncenter size-medium wp-image-10145" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/03-fedmail-announcement-300x120.png" alt="" width="300" height="120" /></a><em>click to enlarge</em></p>
<p>A hint of urgency in this fake Federal Reserve System email, considering it pretends to originate from <em>the</em> central banking system of the United States, may allow someone to click the link without thinking because, well, it&#8217;s &#8220;only&#8221; an announcement. But when it comes to fooling people via email, one has to understand that the more inconspicuous it might appear or sound on the outside, the more one has to be careful in dealing with it. This spam is no different and must be handled with caution.</li>
</ul>
<p>Users are advised to mark the above email threats as spam if they&#8217;re found in their inbox and then/or simply delete them.</p>
<p>The GFI Labs Team</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/email-threats-highlights-eftps-bbb-and-federal-reserve-spam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>LinkedIn Spam: The Repeat</title>
		<link>http://www.gfi.com/blog/linkedin-spam-the-repeat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linkedin-spam-the-repeat</link>
		<comments>http://www.gfi.com/blog/linkedin-spam-the-repeat/#comments</comments>
		<pubDate>Wed, 19 Dec 2012 14:10:21 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10045</guid>
		<description><![CDATA[Another slew of spam claiming to originate from LinkedIn has hit the wild Internet in less than 24 hours, according to the real time recording and tracking of email threats by our researchers in the AV Labs. The malicious spam, this time, poses &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol.png"><img class="alignleft size-thumbnail wp-image-10046" style="border: 0px; margin: 10px;" title="Mohawked &quot;at&quot; symbol" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol-150x150.png" alt="" width="150" height="150" /></a>Another slew of <a href="http://www.gfi.com/products/gfi-mailessentials/pricing#overview"><strong>spam</strong></a> claiming to originate from <strong>LinkedIn </strong>has<strong> </strong>hit the wild Internet in less than 24 hours, <a href="http://gfisoftware.tumblr.com/post/38238165249/malicious-linkedin-invitation-spam-returns">according</a> to the <a href="http://gfisoftware.tumblr.com/">real time recording and tracking of email threats</a> by our researchers in the AV Labs.</p>
<p>The malicious spam, this time, poses a question then gives a less-than-stellar answer to it, something criminals are counting on that recipients may simply accept and believe. Well, we better not take their word for it.</p>
<p>Here&#8217;s what the email looks like:</p>
<p style="text-align: center;"><em><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm.png"><img class="aligncenter size-medium wp-image-10050" title="Screenshot of LinkedIn spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm-300x169.png" alt="" width="300" height="169" /></a>click to enlarge</em></p>
<blockquote><p><strong>From:</strong> {bogus email address}<br />
<strong>To:</strong> {random}<br />
<strong>Subject:</strong> Join my network on LinkedIn<br />
<strong>Message body:</strong><br />
{redacted} has indicated you are a Friend</p>
<p>I’d like to add you to my professional network on LinkedIn.</p>
<p>[Allow button] View invitation from {redacted}</p>
<p>WHY MIGHT CONNECTING WITH {redacted} BE A GOOD IDEA?</p>
<p>{redacted} connections could be useful to you</p>
<p>After accepting {redacted} invitation, check {redacted} connections to see who else you may know and who you might want an introduction to. Building these connections can create opportunities in the future.</p></blockquote>
<p>Clicking the <em>Allow</em> button or the link on the message body directs users to several Web pages of compromised sites, which all look like this<span style="line-height: 24px; font-size: medium;">:</span></p>
<p style="text-align: center;"><span style="font-size: medium;"><span style="line-height: 24px;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm.png"><img class="aligncenter size-medium wp-image-10048" title="Hello, Stranger--NOT!" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm-300x105.png" alt="" width="300" height="105" /></a></span></span><em><span style="line-height: 24px; font-size: medium;">click to enlarge</span></em></p>
<p>This page laced with the <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=27&amp;y=14"><strong>Blackhole Exploit Kit</strong></a> code then auto-redirects users to a Russian website where the <a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0"><strong>Cridex</strong></a> info-stealer payload can be downloaded.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm.png"><img class="aligncenter size-medium wp-image-10049" title="Would you like a Java with that?" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm-300x131.png" alt="" width="300" height="131" /></a><em>click to enlarge</em></p>
<p>Like we&#8217;ve said before, when in doubt, users should simply visit their LinkedIn pages and check their profile mailbox for invites.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/fake-linkedin-mails-lead-to-cridex/">Fake LinkedIn Mails Lead To Cridex</a></li>
<li><a href="http://www.gfi.com/blog/new-phishing-campaign-targets-linkedin-users-with-fake-reminders/">New Phishing Campaign Targets LinkedIn Users with Fake Reminders</a></li>
<li><a href="http://www.gfi.com/blog/zeus-linkedin-mails-still-out-for-delivery/">Zeus LinkedIn mails still out for delivery</a></li>
</ul>
<p>Jovi Umawing (Thanks to the GFI Labs team)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/linkedin-spam-the-repeat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-6</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 17:18:59 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[adobe cs]]></category>
		<category><![CDATA[adobe cs4]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[citi credit card]]></category>
		<category><![CDATA[CitiBank]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[mailbox upgrade]]></category>
		<category><![CDATA[microsoft outlook]]></category>
		<category><![CDATA[outlook express]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10038</guid>
		<description><![CDATA[Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14. &#8220;Mailbox Upgrade&#8221; Email is a Phish. If you&#8217;re using Microsoft Outlook or Outlook Express, I&#8217;m sure you&#8217;re familiar &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2.png"><img class="alignleft size-thumbnail wp-image-10039" style="border: 0px; margin: 10px;" title="Email Threats for the Week (December 10 - 14)" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2-150x150.png" alt="" width="150" height="150" /></a> Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14.</p>
<ul>
<li><strong>&#8220;Mailbox Upgrade&#8221; Email is a Phish. </strong>If you&#8217;re using <strong>Microsoft Outlook</strong> or <strong>Outlook Express</strong>, I&#8217;m sure you&#8217;re familiar with this kind of email landing in our inboxes, especially if IT has set a limit of how much your inbox can carry.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm.png"><img class="aligncenter size-medium wp-image-10042" title="Phishing spam supposedly sent by one &quot;Margaret Colleluori&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm-300x132.png" alt="" width="300" height="132" /></a><em>click to enlarge</em></p>
<p>First off, let me point out two things: one, 20GB of email space is too huge to be believable, and IT normally sets the limit of 2GB; two, IT does not tell their email users to validate anything. What they normally advise is to delete emails or move them to another location to free up space. Users who click the link on the mail is led to a phishing page. Reference <a href="http://gfisoftware.tumblr.com/post/37643320589/e-mail-credentials-phish">here</a>.</li>
<li><strong>Unsolicited &#8220;Adobe CS4 License&#8221; Leads to Malware.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm.png"><img class="aligncenter size-medium wp-image-10043" title="Spam of fake Adobe CS4 license" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm-300x161.png" alt="" width="300" height="161" /></a><em>click to enlarge</em></p>
<p>I wish there won&#8217;t be takers for any outdated Adobe CS4 license any time soon, much less a bogus one.  This leads to a <strong><a href="http://www.gfi.com/blog/?s=blackhole&amp;x=0&amp;y=0">Blackhole</a>-<a href="http://www.gfi.com/blog/?s=cridex&amp;x=16&amp;y=8">Cridex</a></strong> system infection. Details <a href="http://gfisoftware.tumblr.com/post/37791588782/adobe-indesign-cs4-license-spam-returns">here</a>.</li>
<li><strong>Spammers Target Citibank Clients.</strong> Citibank credit card users are recently targeted by this spam circulating in the wild, claiming to be their <strong>Citi Credit Card</strong> statement. Users who click any of the links, unfortunately, may suddenly find their systems infected with the <strong><a href="http://www.gfi.com/blog/?s=zeus&amp;x=0&amp;y=0">Zbot/ZeuS</a></strong> banking Trojan. More <a href="http://gfisoftware.tumblr.com/post/37830503278/malicious-citibank-credit-card-statement-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm.png"><img class="aligncenter size-medium wp-image-10044" title="Bogus Citi Credit Card spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm-300x220.png" alt="" width="300" height="220" /></a><em>click to enlarge</em></p>
</li>
</ul>
<p>If you come across any of these spam emails, it&#8217;s best to simply delete them from your inbox.</p>
<p>Stay safe!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-5/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-5</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-5/#comments</comments>
		<pubDate>Mon, 10 Dec 2012 16:59:23 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[aicpa]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[department of investigation]]></category>
		<category><![CDATA[FedEx]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[socl]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[TLO]]></category>
		<category><![CDATA[upx]]></category>
		<category><![CDATA[wells fargo]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9993</guid>
		<description><![CDATA[Below are our noteworthy email threats for the week of December three to seven: Phishers Target Wells Fargo Clients. Emails from banks claiming that they are unable to verify their client details (&#8220;Regarding what? Didn&#8217;t say, of course.&#8221;) and then &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats1.png"><img class="alignleft size-thumbnail wp-image-9994" style="border: 0px; margin: 10px;" title="December 3 to 7 Email Threats" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats1-150x150.png" alt="" width="150" height="150" /></a></p>
<p>Below are our noteworthy email threats for the week of December three to seven:</p>
<ul>
<li><strong>Phishers Target <a href="http://www.gfi.com/blog/?s=wells+fargo&amp;x=0&amp;y=0">Wells Fargo</a> Clients.</strong> Emails from banks claiming that they are unable to verify their client details (&#8220;Regarding what? Didn&#8217;t say, of course.&#8221;) and then pointing them to a URL where they can confirm their details online should be treated with disdain and must be banished into the the fiery pits of the <em>Trash</em> folder, never to be seen again. More <a href="http://gfisoftware.tumblr.com/post/37284367518/wells-fargo-credentials-phish">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/wellsfargo.png"><img class="aligncenter size-medium wp-image-10002" title="Wells Fargo spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/wellsfargo-300x186.png" alt="" width="300" height="186" /></a><em>click to enlarge</em></p>
</li>
<li><strong>A Short and Sweet Message from the Department of Investigations </strong>can perhaps make anyone&#8217;s blood freeze for a second or two due to intimidation. But recipients of this spam must snap out of it quick since the vagueness of the message should set off something in their heads.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/TLO.png"><img class="aligncenter size-medium wp-image-10003" title="TLO spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/TLO-300x153.png" alt="" width="300" height="153" /></a><em>click to enlarge</em></p>
<p>Clicking the link on the message body allows users to download <strong><a href="http://www.gfi.com/blog/?s=cridex&amp;x=18&amp;y=20">Cridex</a></strong>. Details <a href="http://gfisoftware.tumblr.com/post/37112933060/account-has-been-blocked">here</a>.</li>
<li><strong><a href="http://www.gfi.com/blog/?s=amazon&amp;x=23&amp;y=16">Amazon</a> eBook Spam in the Wild.</strong> It&#8217;s back and it&#8217;s persistent. Spammers behind this malicious spam haven&#8217;t given up on this type of social engineering just yet. Users who click any of the links on the message body may also be infected with Cridex. Check this out <a href="http://gfisoftware.tumblr.com/post/37259744436/malicious-amazon-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/amazon.png"><img class="aligncenter size-medium wp-image-10004" title="Amazon spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/amazon-300x266.png" alt="" width="300" height="266" /></a><em>click to enlarge</em></p>
</li>
<li><strong>Spam Pretends to Come from <a href="http://www.gfi.com/blog/?s=aicpa&amp;x=0&amp;y=0">AICPA</a>.</strong> The <strong>American Institute of CPAs</strong> won&#8217;t be happy about the fact that another slew of spam carrying its name is again making rounds in the Web. <a href="http://www.gfi.com/blog/fake-aicpa-mail-serves-blackholes-and-rootkits/">An earlier variant of this spam</a>, which is found in February of this year, is known to have <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=0&amp;y=0"><strong>Blackhole exploit kits</strong></a> and <a href="http://www.gfi.com/blog/?s=rootkit&amp;x=0&amp;y=0"><strong>rootkits</strong></a> in tow. This variant, however, has Cridex. Details <a href="http://gfisoftware.tumblr.com/post/37410130197/malicious-american-institute-of-cpas-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/AICPA.png"><img class="aligncenter size-medium wp-image-10005" title="AICPA spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/AICPA-300x214.png" alt="" width="300" height="214" /></a><em>click to enlarge</em></p>
</li>
</ul>
<p>We have also highlighted the following spam we found last week that you may also want to check out:</p>
<ul>
<li><a href="http://www.gfi.com/blog/fake-paypal-emails-windows-8-and-vintage-photo-collections/">Fake PayPal Emails: Windows 8 and Vintage Photo Collections</a></li>
<li><a href="http://www.gfi.com/blog/spam-gets-socl/">Spam gets Socl</a></li>
<li><a href="http://www.gfi.com/blog/fake-delivery-notification-gets-confused-has-nice-lie-down/">Fake delivery notification gets confused, has nice lie down</a></li>
</ul>
<p>Stay safe!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-5/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fake PayPal Emails: Windows 8 and Vintage Photo Collections</title>
		<link>http://www.gfi.com/blog/fake-paypal-emails-windows-8-and-vintage-photo-collections/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-paypal-emails-windows-8-and-vintage-photo-collections</link>
		<comments>http://www.gfi.com/blog/fake-paypal-emails-windows-8-and-vintage-photo-collections/#comments</comments>
		<pubDate>Fri, 07 Dec 2012 08:33:21 +0000</pubDate>
		<dc:creator>Chris Boyd</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[ebay]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Windows 8]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9967</guid>
		<description><![CDATA[If you want to panic over a mysterious transaction on Ebay to the tune of $564.48 for a &#8220;Microsoft Windows 8 Pro Anytime Upgrade&#8221;, then this is probably the email you&#8217;ve been waiting for. It reads: You have made an &#8230;]]></description>
				<content:encoded><![CDATA[<p>If you want to panic over a mysterious transaction on Ebay to the tune of $564.48 for a &#8220;Microsoft Windows 8 Pro Anytime Upgrade&#8221;, then this is probably the email you&#8217;ve been waiting for.</p>
<p>It reads:</p>
<blockquote><p>You have made an Ebay.com purchase.</p>
<p>Hello [removed],</p>
<p>You sent a payment of $564.48 USD to [removed].</p>
<p>Microsoft Windows 8 Pro Anytime Upgrade<br />
Item# 16 $564.48 USD</p></blockquote>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/ebaywin8.png"><img class="aligncenter size-medium wp-image-9968" style="border: 0px; margin: 10px;" title="Win 8? Not quite." src="http://www.gfi.com/blog/wp-content/uploads/2012/12/ebaywin8-300x257.png" alt="" width="300" height="257" /></a></p>
<p style="text-align: left;"><em>Click to Enlarge</em></p>
<p>Clicking the link in the fake PayPal email will take end-users to the usual round of Cridex / Blackhole URLs. On a similar note, there&#8217;s an additional email floating around that claims you purchased 84 copies of &#8220;Vintage photo collection sexy college girls 1990s or 2000s&#8221;.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/ebaywin82.png"><img class="aligncenter size-medium wp-image-9969" style="border: 0px; margin: 10px;" title="Vintage photo collection? Not quite..." src="http://www.gfi.com/blog/wp-content/uploads/2012/12/ebaywin82-300x244.png" alt="" width="300" height="244" /></a></p>
<p>Click to Enlarge</p>
<p>Last time we saw this one was back in June where the <a href="http://blog.dynamoo.com/2012/06/paypal-spam-itscholarshipznet.html">tally was 23</a>, so I guess the book is <em>really</em> popular. As above, Cridex is the name of the game so be sure to only check anything you&#8217;ve ordered by logging into your chosen service (and to be fair, you should have a pretty good idea of whether or not you ordered 84 copies of a &#8220;sexy college girls&#8221; book).</p>
<p>Christopher Boyd</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/fake-paypal-emails-windows-8-and-vintage-photo-collections/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-4/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-4</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-4/#comments</comments>
		<pubDate>Mon, 03 Dec 2012 20:37:51 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[eFax]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[FDIC]]></category>
		<category><![CDATA[FedEx]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Western Union]]></category>
		<category><![CDATA[ZBOT]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9926</guid>
		<description><![CDATA[How was your weekend, dear Reader? Hope you had a good one! This week&#8217;s email threat roundup is a bit longer than usual since we didn&#8217;t get to release one during Thanksgiving week. What we have below are noteworthy spam &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats.png"><img class="alignleft size-thumbnail wp-image-9927" style="border: 0px; margin: 10px;" title="Hello, I'm your Monday" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats-150x150.png" alt="" width="150" height="150" /></a>How was your weekend, dear Reader? Hope you had a good one!</p>
<p>This week&#8217;s email threat roundup is a bit longer than usual since we didn&#8217;t get to release one during <strong>Thanksgiving</strong> week.</p>
<p>What we have below are noteworthy spam samples found and documented by our researchers in the AV Labs in <a href="http://gfisoftware.tumblr.com/">our <strong>Tumblr</strong> page</a>. Most of the samples not highlighted here are either slightly tweaked variants of the previous ones we&#8217;ve highlighted before or persistent recurrences of much older spam. No matter how great or small these spam samples have changed, users still end up with the same system infection of information stealers made possible by malware that exploits unpatched software.</p>
<p>Let&#8217;s begin:</p>
<ul>
<li> <strong>&#8220;Provisionally Withheld for Security Reasons&#8221;. </strong>Or so they say:
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdss3eyGzB1r6pupn.png"><img class="aligncenter size-medium wp-image-9929" title="FDIC spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdss3eyGzB1r6pupn-300x186.png" alt="" width="300" height="186" /></a><em>click to enlarge</em></p>
<p>This bogus in-the-wild mail hides behind the name of the <strong>FDIC</strong>, or <strong>Federal Deposit Insurance Corporation</strong>. If you&#8217;re a client, I suggest you think twice before clicking any links, else you&#8217;ll find your system infected with a Trojan that steals banking information called <a href="http://www.gfi.com/blog/?s=cridex&amp;x=26&amp;y=11"><strong>Cridex</strong></a>. More <a href="http://gfisoftware.tumblr.com/post/36146780766/malicious-fdic-spam">here</a>.</li>
<li><strong>WU Spam Zeroes in on Agents.</strong> This spam is designed <em>not</em> to target <strong><a href="http://www.gfi.com/blog/?s=western+union&amp;x=13&amp;y=14">Western Union</a> </strong>clients but those who attend to them.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdstpfMUHg1r6pupn.png"><img class="aligncenter size-medium wp-image-9930" title="WU spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdstpfMUHg1r6pupn-300x190.png" alt="" width="300" height="190" /></a><em>click to enlarge</em></p>
<p>Anyone curious enough to check out the attached file will most likely have no idea that they are downloading and executing a <a href="http://www.gfi.com/blog/?s=zbot&amp;x=22&amp;y=17"><strong>ZBOT</strong></a> malware. Details <a href="http://gfisoftware.tumblr.com/post/36148801532/malicious-western-union-spam">here</a>.</li>
<li><strong>Look Who&#8217;s Posting on <a href="http://www.gfi.com/blog/?s=facebook&amp;x=29&amp;y=20">Facebook</a>.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdx8l7Fw5Y1r6pupn.png"><img class="aligncenter size-medium wp-image-9931" title="Facebook email notice spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdx8l7Fw5Y1r6pupn-300x160.png" alt="" width="300" height="160" /></a><em>click to enlarge</em></p>
<p>If you&#8217;re not familiar with the previous spam samples we mentioned above, you&#8217;ll probably relate more with this one. <strong>Facebook</strong> normally sends notices to its users via email, provided those users have this feature enabled for their own accounts. If you have an account and you have allowed Facebook to send you email notifications, please be extra careful when handling this spam. Better yet, just access your account and check out what your friends have been posting. You don&#8217;t want Cridex on your system now, do you? Details <a href="http://gfisoftware.tumblr.com/post/36331058374/malicious-facebook-notifications-pending-spam">here</a>.</li>
<li><strong>&#8220;You Have One Secure Message&#8221;. </strong>If reading that has made you go &#8220;Ooh!&#8221; and click, I&#8217;m contacting Houston.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdy27igpNk1r6pupn.png"><img class="aligncenter size-medium wp-image-9932" title="Comerica bank spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdy27igpNk1r6pupn-300x151.png" alt="" width="300" height="151" /></a><em>click to enlarge</em></p>
<p>This is similar to <a href="http://gfisoftware.tumblr.com/post/36222532206/key-bank-secure-message-spam">the Key Bank spam</a> we also found not long ago. If you, dear Reader, are not careful with this, you might end up housing a ZBOT variant in your system. Learn more about this spam <a href="http://gfisoftware.tumblr.com/post/36352406093/comerica-bank-secure-message-spam">here</a>.</li>
<li><strong>Spammers Bank on Southwest Airlines.</strong> This probably would have been a good idea; however, avid readers of the GFI Labs blog will likely be more wary of anything related to Southwest Airlines spam. Why? Because we have already exposed more believable and highly effective fake spam (on Facebook, no doubt!) banking on it before (<a href="http://www.gfi.com/blog/free-southwest-airlines-tickets-on-facebook-steer-clear/">1</a>)(<a href="http://www.gfi.com/blog/scammers-bank-on-free-flights-before-the-holidays/">2</a>).
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdr3n1ax4d1r6pupn.png"><img class="aligncenter size-medium wp-image-9933" title="Southwest Airlines spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_mdr3n1ax4d1r6pupn-300x120.png" alt="" width="300" height="120" /></a><em>click to enlarge</em></p>
<p>More <a href="http://gfisoftware.tumblr.com/post/36081179084/malicious-southwest-airlines-spam">here</a>.</li>
<li><strong>eFax Malware. </strong>Little do we realize that many businesses and individuals still rely on using the fax on top of the usual email. It is, therefore, no surprise to see spammers targeting this unique group of users.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_me98w3wuVx1r6pupn.png"><img class="aligncenter size-medium wp-image-9934" title="eFax spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_me98w3wuVx1r6pupn-300x294.png" alt="" width="300" height="294" /></a><em>click to enlarge</em></p>
<p>Email recipients who open the attachment will be infected with ZBOT. Details <a href="http://gfisoftware.tumblr.com/post/36810727243/efax-corporate-message-spam">here</a>.</li>
<li><strong>Another Unclaimed Parcel.</strong> This time, spammers are using <strong>FedEx </strong>to lure unwary recipients. Here&#8217;s what the spam look like:
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_me7enbwTGA1r6pupn.png"><img class="aligncenter size-medium wp-image-9935" title="Fake FedEx spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/tumblr_me7enbwTGA1r6pupn-300x280.png" alt="" width="300" height="280" /></a><em>click to enlarge</em></p>
<p>Clicking the <em>Get Postal Receipt</em> link leads users to websites that host a<strong> fake AV</strong> similar to <a href="http://www.gfi.com/blog/festive-ups-delivery-notice-serves-up-fake-av/">this fake <strong>UPS</strong> spam</a>. Details <a href="http://gfisoftware.tumblr.com/post/36740013826/malicious-fedex-spam-continues">here</a>.</li>
</ul>
<p>We&#8217;re now in the last month of the year. As such, we must expect an increase in email-related threats with themes that revolve around Christmas, New Year and other concepts that are less festive at this time of year, such as the Mayan Apocalypse.</p>
<p>‘Till the next roundup!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-4/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-3/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-3</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-3/#comments</comments>
		<pubDate>Mon, 19 Nov 2012 16:37:04 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[American Express]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[DHL]]></category>
		<category><![CDATA[fake AV]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[ZBOT]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9864</guid>
		<description><![CDATA[Good Monday morning, dear Reader! Without further ado, here is the roundup of email threats for November 12 to 16. &#8220;Congratulations! You and {random name} are now connected!&#8221; click to enlarge This is a spam that purports to have originated &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/11/email-threats.png"><img class="alignleft size-thumbnail wp-image-9865" style="border: 0px; margin: 10px;" title="Email Threats Roundup" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/email-threats-150x150.png" alt="" width="150" height="150" /></a>Good Monday morning, dear Reader!</p>
<p>Without further ado, here is the roundup of email threats for November 12 to 16.</p>
<ul>
<li><strong>&#8220;Congratulations! You and {random name} are now connected!&#8221;</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/11/LinkedIn_11141.png"><img class="aligncenter size-medium wp-image-9868" title="LinkedIn spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/LinkedIn_11141-300x144.png" alt="" width="300" height="144" /></a><em>click to enlarge</em></p>
<p>This is a spam that purports to have originated from <a href="http://www.gfi.com/blog/?s=linkedin&amp;x=21&amp;y=18"><strong>LinkedIn</strong></a>. Once users click any of the links on the message body, they are directed to a website that exposes them to a <strong><a href="http://www.gfi.com/blog/?s=blackhole&amp;x=24&amp;y=27">Blackhole</a>-<a href="http://www.gfi.com/blog/?s=cridex&amp;x=33&amp;y=20">Cridex</a></strong> infection. Details <a href="http://gfisoftware.tumblr.com/post/35707606728/malicious-linkedin-connection-spam">here</a>.</li>
<li><strong>State of PayPal Account Modification.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/11/PayPal_1114.png"><img class="aligncenter size-medium wp-image-9869" title="PayPal spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/PayPal_1114-300x255.png" alt="" width="300" height="255" /></a><em>click to enlarge</em></p>
<p>Same as the previous spam, this also leads to a Blackhole-Cridex system infection. Email details <a href="http://gfisoftware.tumblr.com/post/35708188045/paypal-account-modification-spam">here</a>.</li>
<li><strong>Suspicious Cancellation of American Express Transaction.</strong>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/11/AMEX_1114.png"><img class="aligncenter size-medium wp-image-9870" title="American Express email transaction cancellation" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/AMEX_1114-300x253.png" alt="" width="300" height="253" /></a><em>click to enlarge</em></p>
<p>This spam targets American Express users, informing them that their money transfer has been aborted for undisclosed reasons. Recipients who click any of the links find themselves infected with Cridex, provided the Blackhole exploit kit has found an unpatched software on their system. Details <a href="http://gfisoftware.tumblr.com/post/35708459120/american-express-canceled-trasaction-spam">here</a>.</li>
<li><strong>Fake Verizon Email are Making Rounds Again.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/11/Verizon_1115.png"><img class="aligncenter size-medium wp-image-9871" title="Verizon spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/Verizon_1115-300x263.png" alt="" width="300" height="263" /></a><em><em>click to enlarge</em></em></p>
<p>If you&#8217;r a <strong>Verizon</strong> user, look <a href="http://gfisoftware.tumblr.com/post/35780291369/malicious-verizon-wireless-spam">here.</a> If you click the URL to manage your account, you&#8217;ll be infected with <a href="http://www.gfi.com/blog/?s=zbot&amp;x=22&amp;y=18"><strong>Zbot</strong></a>, a popular information stealer.</li>
<li><strong>Bogus AmEx Spam Encourages You to Check You Fiscal Transaction Statement.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/11/Amex_1115.png"><img class="aligncenter size-medium wp-image-9872" title="American Express fake email notice" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/Amex_1115-260x300.png" alt="" width="260" height="300" /></a><em>click to enlarge</em></p>
<p>Of course, one can easily fall for this tactic if they see the slick looking email above; however, extra caution is advised. The links on the email lead to websites where the Blackhole exploit can take advantage of vulnerable software on your system. More <a href="http://gfisoftware.tumblr.com/post/35789134771/american-express-online-merchant-system-spam">here</a>.</li>
<li><strong>DHL Failed to Deliver Your Parcel. Or so It Says.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/11/DHL.png"><img class="aligncenter size-medium wp-image-9873" title="Fake DHL Notice" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/DHL-286x300.png" alt="" width="286" height="300" /></a><em>click to enlarge</em></p>
<p>Recipients of this spam are enticed to download a postal receipt that they can use to claim an &#8220;undelivered parcel.&#8221; This, however, leads to the download of a <a href="http://www.gfi.com/blog/?s=fake+av&amp;x=10&amp;y=17"><strong>fake AV</strong></a> instead. Details <a href="http://gfisoftware.tumblr.com/post/35840307017/malicious-dhl-spam">here</a>.</li>
</ul>
<p>By familiarizing yourself with the social lures and tactics used by cyber criminals who employ emails to catch their prey, you are more than likely to avoid them and, in turn, warn others about what these threats are. Prevention, after all, is as important (if not more) than remediation.</p>
<p>Stay informed!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-2</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-2/#comments</comments>
		<pubDate>Fri, 09 Nov 2012 08:28:59 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[DUA]]></category>
		<category><![CDATA[election]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[google compare]]></category>
		<category><![CDATA[US election]]></category>
		<category><![CDATA[USAA]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9806</guid>
		<description><![CDATA[We&#8217;re starting off this roundup with a quick recap of what has transpired this week. First off, the US Elections last November 6: As expected, election-related threats have continued to make rounds that day. We won&#8217;t be surprised if we &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/11/email-roundup-avatar.jpg"><img class="alignleft size-thumbnail wp-image-9807" style="border: 0px; margin: 10px;" title="Email Threats Roundup" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/email-roundup-avatar-150x150.jpg" alt="" width="150" height="150" /></a></p>
<p>We&#8217;re starting off this roundup with a quick recap of what has transpired this week.</p>
<p>First off, the US <a href="http://www.gfi.com/blog/?s=election">Elections</a> last November 6: As expected, <a href="http://www.gfi.com/blog/of-elections-and-shenanigans/">election-related threats</a> have continued to make rounds that day. We won&#8217;t be surprised if we continue to see some of them remain in the wild days after winners have been declared, so let&#8217;s keep an eye out for that.</p>
<p>This week in the security industry, we have reports of hits and misses, with <a href="http://www.theregister.co.uk/2012/11/08/google_compare_identity_theft/">a security hole found in <strong>Google Compare</strong></a> being the latest on the list. <em>Le Reg</em> has the exclusive story on that.</p>
<p>Brian Krebs of <em>Krebs on Security</em> has reported on a <a href="http://krebsonsecurity.com/2012/11/experts-warn-of-zero-day-exploit-for-adobe-reader/">zero-day exploit for the latest Adobe Reader being sold for $50,000 in the cybercriminal underground</a>.</p>
<p>Lastly, our friends at <a href="http://www.f-secure.com/weblog/archives/00002450.html">F-Secure have released a Q3 2012 report</a> on the ever increasing threats targeting Android smartphone users despite Google&#8217;s effort of improving its current security policies.</p>
<p>In the realm of email threats, our researchers in the AV Labs have found some <a href="http://www.gfi.com/blog/?s=spam"><strong>spam</strong></a> and <a href="http://www.gfi.com/blog/?s=phishing"><strong>phishing</strong></a> mail samples that we have highlighted below:</p>
<ol>
<li><strong>Malicious New York Division of Unemployment Assistance (DUA) clam spam.</strong> The criminals urge the recipient to provide some necessary information for the processing of the said claim. The link on the email body, however, leads to the download of a <strong><a href="http://www.gfi.com/blog/?s=zeus">ZeuS</a>/<a href="http://www.gfi.com/blog/?s=zbot">Zbot</a></strong> variant, a common information stealer. Details <a href="http://gfisoftware.tumblr.com/post/35277968955/malicious-new-york-unemployment-spam">here</a>.</li>
<li><strong>Malicious airline ticket spam.</strong> Recipients of this fake email supposedly from <strong>Delta Airlines</strong> may find themselves opening a malicious attachment that poses as a plane ticket. Watch out! It&#8217;s a <a href="http://www.gfi.com/blog/?s=rogue+av"><strong>rogue AV</strong></a> file. Details <a href="http://gfisoftware.tumblr.com/post/35277107977/malicious-delta-airlines-attachment-spam">here</a>.</li>
<li><strong>Malicious <a href="http://www.gfi.com/blog/?s=itunes">iTunes</a> receipt spam.</strong> Are you using iTunes? Please be wary, dear Reader, that a new receipt spam making rounds is targeting users. All links on the message body lead to a <strong><a href="http://www.gfi.com/blog/?s=blackhole">Blackhole</a> <a href="http://www.gfi.com/blog/?s=exploit">exploit</a></strong> kit. Details <a href="http://gfisoftware.tumblr.com/post/35272520279/malicious-itunes-receipt-spam">here</a>.</li>
<li><strong>Malicious spam claiming to be failed deliveries.</strong> We have received a handful of those this week, from wire transfers to postal packages. A sample of the former leads users to a <strong>Blackhole/<a href="http://www.gfi.com/blog/?s=cridex">Cridex</a></strong> infection and a sample of the latter to a rogue AV infection. Details <a href="http://gfisoftware.tumblr.com/post/35058215786/malicious-wire-transfer-spam-continued">here</a> and <a href="http://gfisoftware.tumblr.com/post/35212139977/malicious-us-postal-service-spam-continues">here</a>.</li>
</ol>
<p>In case you missed it, we have also written about a <a href="http://www.gfi.com/blog/phishers-take-aim-at-usaa/"><strong>USAA</strong> phishing spam</a> that generally targets military personnel—both active and retired—and their families.</p>
<p>Not every email that ends up in your inbox is safe. It is, therefore, important that we continue to exercise due diligence when handling suspicious emails.</p>
<p>&#8216;Till the next roundup!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 17:13:16 by W3 Total Cache --