{"id":207,"date":"2019-04-06T19:33:16","date_gmt":"2019-04-06T19:33:16","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=207"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"'Employee-Documents---Internal-Use'-Email-Points-to-Malware","status":"publish","type":"post","link":"https:\/\/www.syyhoaxanalyzer.com\/?p=207","title":{"rendered":"&#8216;Employee Documents &#8211; Internal Use&#8217; Email Points to Malware"},"content":{"rendered":"<div>\n<p><a href=\"http:\/\/hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1.jpg\" data-rel=\"penci-gallery-image-content\" ><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"289\" data-permalink=\"https:\/\/www.hoax-slayer.net\/employee-documents-internal-use-email-points-to-malware\/employee-documents-malware-1\/\" data-orig-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1.jpg\" data-orig-size=\"800,533\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"employee-documents-malware-1\" data-image-description=\"\" data-medium-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1-300x200.jpg\" data-large-file=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1.jpg\" class=\"aligncenter size-full wp-image-289\" src=\"https:\/\/hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1.jpg\" alt=\"Employee Documents Malware Email\" width=\"800\" height=\"533\" srcset=\"https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1.jpg 800w, https:\/\/www.hoax-slayer.net\/wp-content\/uploads\/2015\/11\/employee-documents-malware-1-300x200.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>Sometimes, even simple \u00a0tricks \u00a0can be quite effective. In this case, criminals intent on distributing malware are using an email that claims to contain employee documents for internal use.  \u00a0The email contains some rudimentary information about the supposed employee documents and \u00a0includes a link that downloads the document from where it is stored online.<\/p>\n<p>Tired or busy office workers \u00a0may think that the message is just one more internal email that they need to deal with and click the link without due forethought.<\/p>\n<p>But, if they do click the link, a zip file will be automatically downloaded to their computer. The zip harbours a malicious .scr file that, if opened, can install malware on Windows based computers. Once installed, the malware may download other types of malware and log \u00a0sensitive information such as account usernames and passwords from the infected computer. It can then relay \u00a0this stolen information \u00a0to online criminals and allow the criminals to access and control the infected computer.<\/p>\n<p>Versions of this malware email have \u00a0been <a href=\"http:\/\/blog.mxlab.eu\/2014\/12\/19\/email-employee-documents-internal-use-from-no-replaymy-fax-com-leads-to-malicious-zip-file\/\" title=\"Email 'Employee Documents \u00e2\u20ac\u201c Internal Use' from n&#111;&#x2d;&#x72;e&#112;&#x6c;&#x61;y&#64;&#x6d;&#x79;-&#102;&#x61;&#x78;&#46;&#99;&#x6f;&#x6d; leads to malicious Zip file\"> hitting inboxes since late 2014<\/a>.  \u00a0If you receive one, do not click any links or open any attachments that it contains.<\/p>\n<div align=\"center\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HSNet Article Center --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"5727909035\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<p><strong>Example:<\/strong><\/p>\n<div class=\"example\">\n<p><strong>Subject: Employee Documents &#8211; Internal Use<\/strong><\/p>\n<p>DOCUMENT NOTIFICATION, Powered by NetDocuments<\/p>\n<p>DOCUMENT NAME: Employee Documents<\/p>\n<p>DOCUMENT LINK: [Link removed]<\/p>\n<p>Documents are encrypted in transit and store in a secure repository<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\nThis message may contain information that is privileged and confidential. If you received this transmission in error, please notify the sender by reply email and delete the message and any attachments.<\/p>\n<\/div>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom Content --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4810115431\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p class=\"date\">Last updated: \u00a0November 13, 2015<br \/>\nFirst published: \u00a0November 13, 2015<br \/>\nBy Brett M. Christensen<br \/>\n<a class=\"foot\" href=\"http:\/\/www.hoax-slayer.com\/about.shtml\">About Hoax-Slayer<\/a><\/p>\n<p class=\"ref\">References<br \/>\n<a title=\"Email 'Employee Documents \u00e2\u20ac\u201c Internal Use' from &#x6e;o&#x2d;&#114;&#x65;&#112;&#x6c;&#x61;y&#x40;&#109;&#x79;&#45;&#x66;&#97;x&#x2e;&#99;&#x6f;&#109; leads to malicious Zip file\" href=\"http:\/\/blog.mxlab.eu\/2014\/12\/19\/email-employee-documents-internal-use-from-no-replaymy-fax-com-leads-to-malicious-zip-file\/\">Email \u00e2\u20ac\u0153Employee Documents \u00e2\u20ac\u201c Internal Use&#8221; Malware<\/a><br \/>\n<a title=\"Malware Threat Articles\" href=\"http:\/\/www.hoax-slayer.com\/malware-threat-articles.shtml\">Malware Threat Articles<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/employee-documents-internal-use-email-points-to-malware\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/employee-documents-internal-use-email-points-to-malware\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes, even simple \u00a0tricks \u00a0can be quite effective. In this case, criminals intent on distributing malware are using an email that claims to contain employee documents for internal use. \u00a0The email contains some rudimentary information about the supposed employee documents and \u00a0includes a link that downloads the document from where it is stored online. Tired [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/207"}],"collection":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=207"}],"version-history":[{"count":0,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}