English

Fake Password Protected Job Application Emails Contain Macro Malware

Malicious emails that masquerade as harmless job application requests with attached resumes are currently hitting inboxes.  




The emails ask you to open  an attached Microsoft Word file that supposedly contains the sender’s resume.   The email also includes a password that you will supposedly  need to view the attached document.

The emails are not from genuine  job seekers and the attached files are not resumes.

Instead, opening the attached file and following the instructions can install malware on your computer.

When you open the attached  Word document, you will be prompted to enter the password provided in the body of the scam email.

Then, a notification will claim that the document is protected and you must enable content before you can access it.

If you do enable content as instructed, a malicious macro can then download and install malware.

The exact nature of this malware may vary. Often, it is ransomware. Ransomware locks  the files on your computer and then demands that you pay a fee to online criminals to get a file decryption key. In other cases, the malware may be designed to steal sensitive information such as passwords.

For those that may not be aware, a macro is a set of commands and instructions that can be collected as a single command in order to quickly and automatically accomplish a task.

Complex macros can be created using VBA (Visual Basic for Applications) and can be very helpful in some workflows.

But malicious VBA macros can also be created and distributed. In years gone by, macro viruses were common computer security threats. But, for the last several years, they have been much less significant due to the fact that later versions of Microsoft Office disabled macros by default and implemented other security measures.

However, criminals have apparently realized that many computer users will have forgotten about or have no knowledge of macro threats. Thus,  malicious macros are again being used  to spread malware.  

In modern incarnations of the threat, criminals do not try to subvert in-built security systems but use simple social engineering techniques to get users to allow the macros to run. The criminals rely on the curiosity of recipients who may proceed without due caution in the hope of finally viewing the promised document content.

Unless you have a compelling reason, you would be best to leave macros disabled by default. And do not believe any message that claims that you must enable macros to view or interact with Microsoft Office documents.

The criminals  are password protecting these malware documents as a means of thwarting security software that may otherwise  block or flag the attachment.  



Be wary of any message that claims that you need to enable editing or  enable content to view an ordinary document such as a resume or invoice.   Doing so enables macros and there is no good reason why macros would ever be required  just to view such documents.

Criminals  regularly use fake resumes and CVs as a means of distributing malware.

Here’s the text of the malware email:

Subject: Job Application

How is your day?
My name is Lana and I’m interested in a position.

I’ve attached a copy of my resume.
The password is “1234”

Best regards!

Lana

Attached file: “Lana.doc”

 









Original Source : https://www.hoax-slayer.net/fake-password-protected-job-application-emails-contain-macro-malware/