FYI...
Fake e-mails from Electronic Payments Association NACHA
-
http://community.web...tion-nacha.aspx
06 Sep 2011 - "Websense... has been tracking a large number of messages masquerading as legitimate messages from the Electronic Payment Association NACHA. The messages bear legitimate traits, as the display name and routing details seem to confirm. Further analysis of the message and attachments prove these to be
malicious in intent... an unsuspecting member or patron of the service might just fall for this... The use of a double extension on a file name as well as the exact format of the message, including the Subject, attests to the reuse of the campaign... Although this might seem to have come from NACHA, the routing details suggest otherwise as they do not originate from the publicly-known MX records for the organization... VirusTotal results*..."
(Screenshots available at the websense URL above.)
*
https://www.virustot...de91-1315379402
File name:
FormApp_23131.zip
Submission date: 2011-
09-07 07:10:02 (UTC)
Result:
30/44 (68.2%)
ACH spam campaign analysis...
-
http://labs.m86secur...-spam-campaign/
September 6, 2011 - "... Automated Clearing House (ACH) is an an electronic network for financial transactions in the United States overseen by
NACHA. Last week, we came across a suspicious looking spam campaign with the unusual subject line “UAE Central Bank Warning: Email scam alert”. After closer investigation, we determined that it was indeed a fake ACH notification. The message contained an attached malicious file using the filename “document.zip”. As suspected, the malicious file attachment was a downloader that we have seen a lot of lately – Chepvil... The Chepvil downloader, unsurprisingly, proceeded to retrieve more than just one piece of additional malware. First was the password stealing malware,
Zbot... downloading the file “s.exe” – a Zbot variant**... The file “22.exe” was interesting because we had not encountered it before. It was detected*** by 22 out of 45 antivirus programs... Upon execution, the proxy spambot drops a copy of itself in the Windows TEMP folder as svchost.exe... This spambot’s recent spamming activities includes both pharmaceutical, and further ACH campaigns that appears to be from NACHA.org; and are very similar to the one which led to this infection in the first place..."
**
https://www.virustot...f6fd-1315391834
File name: file
Submission date: 2011-
09-07 10:37:14 (UTC)
Result:
34/44 (77.3%)
***
https://www.virustot...e3ee-1315187924
File name:
svchost.exe
Submission date: 2011-09-05 01:58:44 (UTC)
Result:
31/44 (70.5%)
___
Virus Outbreak In Progress
-
http://www.ironport.com/toc/
Sep. 7, 2011
-
http://tools.cisco.c...Outbreak.x?i=77
Malicious Account Information E-mail Msgs...
-
http://tools.cisco.c...x?alertId=24092
Fake Parcel Delivery Failure Notification E-mail Msgs...
-
http://tools.cisco.c...x?alertId=23917
Fake Presentation E-mail Msgs...
-
http://tools.cisco.c...x?alertId=24082
Fake FDIC Document E-mail Msgs...
-
http://tools.cisco.c...x?alertId=24028
Malicious Changelog Attachment E-mail Msgs...
-
http://tools.cisco.c...x?alertId=23588
Edited by AplusWebMaster, 07 September 2011 - 09:20 AM.