FYI...
Fake 'USPS' SPAM - delivers Sage 2 ransomware
- https://myonlinesecu...e-2-ransomware/
26 Jan 2017 - "... Sage 2 ransomware has started to use the same email template that we see daily that normally delivers Locky ransomware and Kovter Trojans HERE:
> https://myonlinesecu...nd-locky-sites/
... The only noticeable difference between the 2 campaigns (until you actually analyse the files inside the zip attachments) is the file size and file names. In the Locky/Kovter versions they were using .js files but now use lnk files... Locky /Kovter use a file name something like Delivery-Receipt-3793490.zip that extracts to another zip file Delivery-Receipt-3793490.doc..zip that eventually extracts to Delivery-Receipt-3793490.doc.lnk where the numbers change with each email received. There are numerous different download sites for the malware each day. Sage 2 ransomware uses a static named file for all emails, currently Delivery-Details.zip extracting to Delivery-Details.js - There is one download site each day... One of the emails looks like:
From: USPS Ground <uwawsne253468@ netpetar .com>
Date: Thu 26/01/2017 02:04
Subject: Delivery problem, parcel USPS #40088683
Attachment: Delivery-Details.zip
Hello,
Your item has arrived at Thu, 26 Jan 2017 03:04:09 +0100, but our courier
was not able to deliver the parcel.
You can download the shipment label attached!
All the best.
Leisha Marshman – USPS Support Agent.
26 January 2017: Delivery-Details.zip: Extracts to: Delivery-Details.js - Current Virus total detections 14/53*
Payload Security** shows a download from http ://affections .top/ff/55.exe (VirusTotal 14/56***) (Payload Security [4])... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1485410870/
** https://www.hybrid-a...vironmentId=100
*** https://www.virustot...sis/1485413961/
4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
54.211.245.199
affections .top: 54.165.5.111: https://www.virustot...11/information/
Country US / Autonomous System 14618 (Amazon.com, Inc.)
> https://www.virustot...509d1/analysis/
52.203.213.69: https://www.virustot...69/information/
___
Fake 'Microsoft' SPAM - delivers malware
- https://myonlinesecu...nknown-malware/
26 Jan 2017 - "A blank/empty email pretending to come from Microsoft with a subject like 'RE: 23337 Microsoft Free 23337' with zip attachment that extracts to another zip file that in turn contains a malicious word doc...
Update: I am being told it is Ursnif banking Trojan... Update again: ... weird. This site is delivering different malware, almost at random it seems. Each visit gives a -different- file, although always the same name read.doc or read.php - currently all are 243kb but all have different file #. So far we have seen Cerber, Ursnif and the original unknown malware... The email looks like:
From: tcmf.microsoft <suard-c@ vendome .pf>
Date: Thu 26/01/2017 16:00
Subject: RE: 23337 Microsoft Free 23337
Attachment: 55554546637489.zip
Body content: totally blank/empty
> https://www.reverse....vironmentId=100
Contacted Hosts
208.67.222.222
195.5.126.248
46.150.69.43
188.27.92.82
> https://www.hybrid-a...vironmentId=100
Contacted Hosts (576)
26 January 2017: 55554546637489.zip: extracts to: 4446_ZIP.zip extracts to 4446.doc
Current Virus total detections 2/55*. Payload Security shows a download from
http ://vvorootad .top/read.php?f=0.dat which delivers read.doc (which is -not- a doc file, although having an icon looking like a word doc, but a renamed .exe) (VirusTotal 9/57**). Payload Security***... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1485447397/
** https://www.virustot...sis/1485448703/
*** https://www.hybrid-a...vironmentId=100
vvorootad .top: 52.203.115.53: https://www.virustot...53/information/
> https://www.virustot...76629/analysis/
35.165.86.173: https://www.virustot...73/information/
> https://www.virustot...31339/analysis/
___
Spyware on a Chromebook ??
- http://www.computerw...chromebook.html
Jan 25, 2017 - "... According to Google*, it means the extension 'can enable, disable, uninstall or launch themes, extensions, and apps you have installed'. Uninstall and disable other extensions? Are you kidding me? Why does Chrome even allow this? Web browsers do -not- allow a page on one website to interact with a page on another. Why does Chrome let an extension from Developer A disable or uninstall one from Developer B? Perhaps worse, is that Chrome does not warn, at installation time, about the modification to the New Tab page. This is inexcusable. And here's a sentence I never expected to write. When it comes to extensions modifying the New Tab page, Chrome on Windows is more secure than Chrome on Chrome OS..."
* https://support.goog...er/186213?hl=en
(More detail at the computerworld URL above.)
Edited by AplusWebMaster, 26 January 2017 - 03:36 PM.