{"id":72541,"date":"2011-07-28T11:22:47","date_gmt":"2011-07-28T11:22:47","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72541"},"modified":"2011-07-28T11:22:47","modified_gmt":"2011-07-28T11:22:47","slug":"mastercard-spam-leads-to-fake-av","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/mastercard-spam-leads-to-fake-av\/","title":{"rendered":"MasterCard spam leads to Fake AV"},"content":{"rendered":"<p>We&#8217;re seeing a significant &#8220;spam attached malware&#8221; campaign in the past 48 hours with different attachment MD5s.<\/p>\n<p>3305f83abf31fc66fa8f588b35be8eb2<br \/>\n8e3331b64a5884e1ef4f4c8a3d09bc7a<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/new-jul23.mastercardSmallWinCE.PNG\" alt=\"\" width=\"240\" height=\"185\" \/><\/p>\n<p>The username portion of the email sender is random, using a classic misspelling that has been consistent. Usernames are a single word, followed by a &#8220;.&#8221;, &#8220;_&#8221; or &#8220;-&#8220;, followed by a two or three digit number. The most popular words (by far) are &#8220;manager&#8221; and &#8220;support&#8221;, but we&#8217;ve also seen &#8220;admin&#8221;, &#8220;administration&#8221;, &#8220;alerts&#8221;, &#8220;cunsumer&#8221;, &#8220;delivery&#8221;, &#8220;e-file&#8221;, &#8220;finance&#8221;, &#8220;frboard-webannouncements&#8221;, &#8220;govdelivery&#8221;, &#8220;information&#8221;, &#8220;inspector&#8221;, &#8220;news&#8221;, &#8220;news-alerts&#8221;, &#8220;no-reply&#8221;, &#8220;protection&#8221;, &#8220;public&#8221;, &#8220;report&#8221;, &#8220;service&#8221;, &#8220;stats&#8221;, &#8220;subscriber&#8221;, &#8220;subscriptions&#8221;, &#8220;usttb&#8221; and &#8220;webannouncements&#8221;.<\/p>\n<p>The attached file is actually named as a &#8220;.com&#8221; using a random seeming filename in the format &#8220;id&#8221; followed by a 5-7 digit number (such as id918538.com).<\/p>\n<p>When the file is launched, it attempts to make a connection with any of a long list of domains that are probably made by a &#8220;DGA&#8221; or &#8220;Domain Generation Algorithm&#8221;. It&#8217;s likely that at different times or days this list would be different. The purpose of the malware seems to be just another fake anti-virus product. Here&#8217;s the scan that kicked off:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/new-jul23.scanningSmallWinCE.PNG\" alt=\"\" width=\"240\" height=\"168\" \/><\/p>\n<p>After the scan, as expected, I was constantly reminded of the grave danger I was in:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/newjul23.dangerSmallWinCE.PNG\" alt=\"\" width=\"240\" height=\"177\" \/><\/p>\n<p>By using <a href=\"https:\/\/www.quickheal.com\/qh-total-security.asp\">Quick Heal Total security<\/a>, such fraudulent emails get tagged as spam and users stay protected.<br \/>\nQuick Heal also detects malicious attachments and the installed rogueware files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/new-jul23.qhWinCE.PNG\" alt=\"\" width=\"240\" height=\"130\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re seeing a significant &#8220;spam attached malware&#8221; campaign in the past 48 hours with different attachment MD5s. 3305f83abf31fc66fa8f588b35be8eb2 8e3331b64a5884e1ef4f4c8a3d09bc7a The username portion of the email sender is random, using a classic misspelling that has been consistent. Usernames are a single word, followed by a &#8220;.&#8221;, &#8220;_&#8221; or &#8220;-&#8220;, followed by a two or three digit [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24],"tags":[22,23,25,26,27],"class_list":["post-72541","post","type-post","status-publish","format-standard","hentry","category-email","category-malware","tag-email-malware","tag-fraudulent-email","tag-phishing","tag-rogueware","tag-scareware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72541"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72541"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72541\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}