{"id":72489,"date":"2011-09-02T06:57:20","date_gmt":"2011-09-02T06:57:20","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72489"},"modified":"2011-09-02T06:57:20","modified_gmt":"2011-09-02T06:57:20","slug":"update-your-e-mail-security-immediately-iueu-scam","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/update-your-e-mail-security-immediately-iueu-scam\/","title":{"rendered":"UPDATE YOUR E-MAIL SECURITY IMMEDIATELY (IUEU) SCAM!"},"content":{"rendered":"<p>Today we received the following email:<\/p>\n<p>**************************************************************<\/p>\n<p>From: &#8220;Squirrel Mail Development Team&#8221;<\/p>\n<p>Subject: UPDATE YOUR E-MAIL SECURITY IMMEDIATELY (IUEU)<\/p>\n<p>Date: Thu, 1 Sep 2011 19:14:23 +0700<\/p>\n<p>X-Mailer: Microsoft Outlook Express 6.00.2600.0000<\/p>\n<p>X-EMLSPAM: 0<\/p>\n<p>X-EMLSPAM-SCORE: -100<\/p>\n<p>Dear E-Mail User<\/p>\n<p>Due to the package compromise of 1.4.11,1.4.12 and 1.4.13, we are<\/p>\n<p>forced to release 1.4.15 to ensure no confusions. While initial review<\/p>\n<p>didn&#8217;t uncover a need for concern, several proof of concepts show that<\/p>\n<p>the package alterations introduce a high risk security issue, allowing<\/p>\n<p>remote inclusion of files. These changes would allow a remote user the<\/p>\n<p>ability to execute exploit code on a victim machine, without any user<\/p>\n<p>interaction on the victim&#8217;s server. This could grant the attacker the<\/p>\n<p>ability to deploy further code on the victim&#8217;s server.<\/p>\n<p>So upgrade to Squirrel Mail Development Team by<\/p>\n<p>click Squirrel Mail Login SquirrelMail 1.4.15 Released<\/p>\n<p>We STRONGLY advise all users of 1.4.11, 1.4.12 and 1.4.13 upgrade<\/p>\n<p>immediately.<\/p>\n<p>**************************************************************<\/p>\n<p>The link &#8220;hxxp:\/\/www.d[xxxxxxxx]n.org\/themes\/ThemeDesign-Caspian\/images\/squire.php&#8221; inside the above email was responsible for executing suspicious java script as shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/34.JPG\" alt=\"\" width=\"600\" height=\"72\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/35.JPG\" alt=\"\" width=\"601\" height=\"95\" \/><\/p>\n<p>We found it was further diverting users to a malicious domain &#8211; &#8220;hxxp:\/\/www.[xxxxx].fr\/ext\/&#8221;.<\/p>\n<p>Users should not respond or click on any link inside such mails as they may lead to downloading of Trojans from arbitrary websites.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we received the following email: ************************************************************** From: &#8220;Squirrel Mail Development Team&#8221; Subject: UPDATE YOUR E-MAIL SECURITY IMMEDIATELY (IUEU) Date: Thu, 1 Sep 2011 19:14:23 +0700 X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-EMLSPAM: 0 X-EMLSPAM-SCORE: -100 Dear E-Mail User Due to the package compromise of 1.4.11,1.4.12 and 1.4.13, we are forced to release 1.4.15 to ensure [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24],"tags":[22,23,47,40],"class_list":["post-72489","post","type-post","status-publish","format-standard","hentry","category-email","category-malware","tag-email-malware","tag-fraudulent-email","tag-security","tag-trojan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72489"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72489"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72489\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}