{"id":72326,"date":"2012-01-18T11:12:32","date_gmt":"2012-01-18T11:12:32","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72326"},"modified":"2012-01-18T11:12:32","modified_gmt":"2012-01-18T11:12:32","slug":"fake-emails-american-airlines","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/fake-emails-american-airlines\/","title":{"rendered":"Fake emails &#8211; American Airlines"},"content":{"rendered":"<p>I have come across some significant activity related to spam email messages that are pretending to be from American Airlines. This email misguides the user that his purchased ticket scan copy is attached with this email and asks him to print it for use.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogarchive.quickheal.com\/uploads\/Air_eml222Custom.PNG\" alt=\"\" width=\"500\" height=\"434\" \/><\/p>\n<p>The email has &#8220;Ticket.zip&#8221; as an attachment contains a malicious &#8216;Ticket.exe&#8217; file. When executed it infects the system with a malicious code. In this case the attached sample installs the Rogueware named <strong>XP Home Security 2012<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogarchive.quickheal.com\/uploads\/Air_XP-2012-01-16-18-11-24Custom.png\" alt=\"\" width=\"500\" height=\"350\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogarchive.quickheal.com\/uploads\/Air_XP-2012-01-16-18-12-49Custom.png\" alt=\"\" width=\"500\" height=\"365\" \/><\/p>\n<p><a href=\"https:\/\/www.quickheal.com\/\">Quick Heal<\/a> detects and deletes the attached file and installed rogue security software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have come across some significant activity related to spam email messages that are pretending to be from American Airlines. This email misguides the user that his purchased ticket scan copy is attached with this email and asks him to print it for use. The email has &#8220;Ticket.zip&#8221; as an attachment contains a malicious &#8216;Ticket.exe&#8217; [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24],"tags":[22,23,49,26],"class_list":["post-72326","post","type-post","status-publish","format-standard","hentry","category-email","category-malware","tag-email-malware","tag-fraudulent-email","tag-malware","tag-rogueware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72326"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72326"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72326\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}