{"id":1031,"date":"2019-04-06T19:33:30","date_gmt":"2019-04-06T19:33:30","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=1031"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"Blank-'Business-Card'-Emails-Contain-JavaScript-Malware-in-Attachment","status":"publish","type":"post","link":"https:\/\/www.syyhoaxanalyzer.com\/?p=1031","title":{"rendered":"Blank &#8216;Business Card&#8217; Emails Contain JavaScript Malware in Attachment"},"content":{"rendered":"<div>\n<p><span style=\"color: #ff0000;\"><strong>Outline:<\/strong><\/span><br \/>\nEmail with the subject line &#8216;Business Card&#8217; and no content in the body includes an attached .zip file.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Top Content Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4870821038\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Brief Analysis:<\/strong><\/span><br \/>\nThe attached file does not contain a business card as implied by the subject line. Opening the .zip file reveals a malicious JavaScript (.js) file that, if opened, can download and install \u00a0malware.<\/p>\n<div class=\"example\"><span style=\"color: #ff0000;\"><b>Example:<\/b><\/span><br \/>\n<strong>Subject: Business Card<\/strong><\/p>\n<p>[Blank Body]<\/p>\n<p>Attachment: IMG_1670.ZIP<\/p>\n<p><a href=\"http:\/\/hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1.jpg\" data-rel=\"penci-gallery-image-content\" ><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1628\" data-permalink=\"https:\/\/www.hoax-slayer.net\/blank-business-card-emails-contain-javascript-malware-in-attachment\/business-card-malware-email-1\/\" data-orig-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1.jpg\" data-orig-size=\"800,670\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"business-card-malware-email-1\" data-image-description=\"\" data-medium-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1-300x251.jpg\" data-large-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1.jpg\" class=\"aligncenter size-full wp-image-1628\" src=\"https:\/\/hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1.jpg\" alt=\"Business Card Malware Email\" width=\"800\" height=\"670\" srcset=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1.jpg 800w, https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1-300x251.jpg 300w, https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1-768x643.jpg 768w, https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2016\/04\/business-card-malware-email-1-239x200.jpg 239w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<\/div>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HSNet Article Center --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"5727909035\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Detailed Analysis:<\/strong><\/span><br \/>\nSometimes, even the simplest of tricks can be effective.  \u00a0In this case, cybercrooks have sent out a \u00a0malicious \u00a0email that has no text at all in the body but has the subject line &#8216;Business Card&#8217;.  \u00a0The email includes an attached .zip file called &#8216;IMG_1670&#8217;.  \u00a0The implication is that the attached file contains a \u00a0harmless \u00a0business card.<\/p>\n<p>Recipients who are still naive to the \u00a0nefarious ways of the Internet may open the attachment out of simple curiosity. Inside the .zip file, they will find another \u00a0&#8216;IMG&#8217; file with the extension &#8216;.js&#8217;. The .js extension means \u00a0that the file is a JavaScript.  \u00a0But, if \u00a0the JavaScript file is opened, it may \u00a0download and install a <a title=\"Business Card \u00e2\u20ac\u201c JS malware leads to Dridex\" href=\"https:\/\/myonlinesecurity.co.uk\/business-card-tracey-gittens-js-malware\/\">version of the \u00a0Dridex trojan<\/a>.  \u00a0Once installed, the trojan can harvest online banking credentials and other sensitive personal information from the infected computer and send it to the criminals. Alternatively, malicious JavaScript attachments like this one may download and install <a title=\"Fake 'Order Status' Emails Contain Locky Malware\" href=\"http:\/\/hoax-slayer.net\/fake-order-status-emails-contain-locky-malware\/\">Locky Ransomware<\/a>.<\/p>\n<p>Details such as the supposed sender, the attachment name, and the purpose of the malware payload may vary in different versions \u00a0of these emails.<\/p>\n<p>If you receive one of these blank &#8216;Business Card&#8217; emails, do not open any attachments or click any links that it contains.<\/p>\n<div align=\"center\">\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom AdLinks --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"1358951439\"\n     data-ad-format=\"link\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<p class=\"date\">Last updated: April 19, 2016<br \/>\nFirst published: April 19, 2016<br \/>\nBy Brett M. Christensen<br \/>\n<a class=\"foot\" href=\"http:\/\/www.hoax-slayer.com\/about.shtml\">About Hoax-Slayer<\/a><\/p>\n<p class=\"ref\">References<br \/>\n<a title=\"Business Card \u00e2\u20ac\u201c JS malware leads to Dridex\" href=\"https:\/\/myonlinesecurity.co.uk\/business-card-tracey-gittens-js-malware\/\">Business Card \u00e2\u20ac\u201c JS malware leads to Dridex<\/a><br \/>\n<a title=\"Fake 'Order Status' Emails Contain Locky Malware\" href=\"http:\/\/hoax-slayer.net\/fake-order-status-emails-contain-locky-malware\/\">Fake &#8216;Order Status&#8217; Emails Contain Locky Malware<\/a><br \/>\n<a title=\"Malware Threat Articles\" href=\"http:\/\/www.hoax-slayer.com\/malware-threat-articles.shtml\">Malware Threat Articles<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/blank-business-card-emails-contain-javascript-malware-in-attachment\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/blank-business-card-emails-contain-javascript-malware-in-attachment\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Outline: Email with the subject line &#8216;Business Card&#8217; and no content in the body includes an attached .zip file. Brief Analysis: The attached file does not contain a business card as implied by the subject line. Opening the .zip file reveals a malicious JavaScript (.js) file that, if opened, can download and install \u00a0malware. Example: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/1031"}],"collection":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1031"}],"version-history":[{"count":0,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/1031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}