English

Fake Maersk Line Shipping Documents Email Links to Malware

This email, which purports to be from  container shipping company Maersk Line, claims that you can open an attached file to view original shipping documents supposedly related to a consignment that is being shipped to you.  




However, the email is not from  Maersk Line and has no connection to the company.   And, the attachments do not open any shipping documents.

Here is what the initial malware email looks like:

Maersk Shipping Documents Malware Email

If you click the HTML attachment, it will open in your default browser and will attempt to automatically download a Microsoft Word document:

HTML Malware Attachment

If you click  the PDF attachment,   a supposedly “secure or protected” file will open  in your PDF reader. The blurred out background may seem like a genuine shipping document at first glance.   You will be prompted to click a link to unlock the full PDF. However, clicking the link again downloads  a Microsoft word file:

Bogus PDF links to Malware

Regardless of which attachment you open, you will end up with the same Word file. When you try to open the Word file, you will then be told that you must enable macros before you can view the file’s contents. But, if you do enable macros, a malicious macro will then download and install further malware.    



For those that may not be aware, a macro is a set of commands and instructions that can be collected as a single command in order to quickly and automatically accomplish a task.

Complex macros can be created using VBA (Visual Basic for Applications) and can be very helpful in some workflows.

But malicious VBA macros can also be created and distributed. In years gone by, macro viruses were common computer security threats. But, for the last several years, they have been much less significant due to the fact that later versions of Microsoft Office disabled macros by default and implemented other security measures.

However, criminals have apparently realized that many computer users will have forgotten about or have no knowledge of macro threats. Thus,  malicious macros are again being used  to spread malware.  

In modern incarnations of the threat, criminals do not try to subvert in-built security systems but use simple social engineering techniques to get users to allow the macros to run. The criminals rely on the curiosity of recipients who may proceed without due caution in the hope of finally viewing the promised document content.

Unless you have a compelling reason, you would be best to leave macros disabled by default. And do not believe any message that claims that you must enable macros to view or interact with Microsoft Office documents.

The malware that the macro downloads  may be ransomware that locks up all of the files on your computer and then demands a fee for the unlock  code.   Or, the malware may be designed to steal sensitive information such as banking passwords from your computer and sent it to online criminals.

The criminals responsible  for distributing these scam emails hope that at least a few recipients will download the file either  out of curiosity or concern. Even if they are not expecting any consignment and have had no dealings with Maersk Line. And, alas, many people will download  the files and infect their computers with malware.

Malware campaigns like this are very common and use the names of many different companies around the world to make their false claims seem more plausible.









Original Source : https://www.hoax-slayer.net/fake-maersk-line-shipping-documents-email-links-to-malware/