Keyword: trojhybrisp33
10237 Total Search   |   Showing Results : 1641 - 1660
A number of users may receive a fake utility bill email that contains malware. The email is in Japanese and contains an .xls attachment that is supposed to be filled up by the recipient. However,
We have found a number of fake fax emails finding their way to infect users' machines with ransomware. The body of the email contains a link that, if clicked, directs the user to a ransomware-related
An email with the subject 'Emailed Invoice - [random_number]' using a random name claiming to be from the recipients domain is spreading Locky ransomware. The spam campaign uses a new technique to
Another fake online bill has been spotted and the sample we found is posing to be from a British telecommunications company. The spammed message deceives its recipients by making the email look
Fake emails spoofing Herbalife are infecting users with malicious code. The email is an acknowledgement of purchase that includes an attached tax invoice. Unsuspecting recipients who open the
We have observed a spam campaign carrying ransom threats, claiming to be from a collective of AWN-Rans and threatening to attack the recipients' computers and network servers. The message demands
We recently have observed a spam campaign being delivered to users in the form of a purchase invoice that claims to be from the e-commerce company, eBay. Recipients of this fake invoice will see
Ransomware is a common malicious attachment found in spam mail campaigns. In this particular instance, we found samples of two new spam campaigns sporting Locky ransomware making the rounds. The
Trojan Powmet are arriving as attachments to invoice and efax-related emails. In spoofed invoice mails, .xls attachments were used while spoofed efax email used .doc attachments. Upon investigation,
Ransomware-related spam emails usually use archived attachments to deliver the malware. However, this time, we've found the ransomware Locky to arrive via spam emails that contain HTML attachments.
More news on the malicious spam front - we recently received two waves of what appears to be malformed malspam. The first one has 'Supplement payment [Random Number]' for its subject heading, while