Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Threat Outbreak Alert

Threat Outbreak Alert: Fake Invoice Statement Attachment Email Messages on April 15, 2014

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:27077
Version:78
First Published:2012 October 01 21:39 GMT
Last Published:2014 April 16 11:23 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Mild Damage
 
 
Version Summary:Cisco Security has detected significant activity on April 15, 2014.
 

Description
 
Cisco Security has detected significant activity related to spam email messages that claim to contain an invoice statement for the recipient. The text in the email message attempts to convince the recipient to open the attachment and view the details. However, the .zip attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID4626, RuleID4626KVR, RuleID4626_2KVR, RuleID4626KVR_1 and RuleID2970KVR) may contain any of the following files:

Invoices-28-2012.zip
Invoice_AA-N999278482.exe
Invoice_N0345.zip
Invoices_12_N88283.exe
Invoice_j5898320.zip
Invoice_10302012_MK938.exe
Invoice_URGN-889289.exe
Invoice_1010732785.exe
PURCHASE ORDER.zip
invoice.exe
Invoice_QuickBooks_02_22_2013.zip
Invoice_QuickBooks_02_22_2013.exe
Invoices_APO2888302.doc.exe
Invoice_5549855.zip
Invoice_98298997397.exe
INVOICE_28781731.zip
INVOICE_28781731.exe
Invoice_1882384.zip
Invoice_1882384.exe
INVOICE_1892891.zip
INVOICE_1892891.exe
invoice copy.zip
invoice copy.exe
invoice copy(2).zip
invoice copy(2).exe

Invoice_18803891.zip
Invoice_18803891.exe
invoice copy(4).zip
invoice copy(4).exe
invoice 4532.zip
invoice 4532.exe
Appliances Online - Receipt.zip
Appliances Online - Receipt .pdf.exe
Invoice_6992067.zip
Invoice_06042013.exe
Invoice_1551966.zip
Invoice_06192013.exe
concubinesip54_Invoice.zip
Invoice_06202013_QBK.exe
INVOICE II.zip
INVOICE II.exe
Invoice_9211641.zip
Invoice_07162013.PDF.exe
invoice-6904885 copy.zip
invoice copy (2).exe
TNT invoice.zip
TNT invoice.exe
invoice-2131 copy.zip
invoice-2131 copy.exe
Invoice_3289981_381.zip
Invoice_3289981_381.exe
INVOICE_cworst.zip
Invoice_18072013.exe
Invoice.pdf.exe
Invoice_5420-16948.zip
Invoice_5420-16948.exe
Invoice_2290567.zip
Invoice_08302013.exe
Invoice_0416165.zip
Invoice_04092013.exe
ValuationOfTheProperty.zip
Valuation.pdf.scr
QUOTE FOR ATTCHED .pdf.zip
QUOTE FOR ATTCHED .pdf.scr
PO # 097654.pdf.zip
PO #097654.pdf.exe
Quotation_invoice.zip
Quotation&invoice.exe
Invoice_Ref.6190303952.52.zip
Invoice_Ref.8490875904.64.pdf.exe
Invoice_0036866.zip
Invoice_092513.exe
INVOICE_5436233.zip
Invoice_10022013.exe
Invoice_OCT-02-2013.zip
Invoice_OCT-02-2013.exe
Invoice NO 0147777.zip
image01.exe
Invoice_8565469.zip
Invoice_26378671.exe
Invoice_1589545.zip
Invoice_101013.exe
invoice_1984912_923b.pdf.exe
invoice_23898422_93mn.pdf.exe
Invoice_874572087967.zip
Invoice_10182013.exe
invoice_356756245_767nu.pdf.exe
Urgent PO.jpg.zip
Urgent PO.jpg.exe
invoice_09581-590324ap.pdf.exe
invoice_9238492358239_234.pdf.exe
invoice_64545_1025.zip
invoice_64545_1025.exe
invoice_923592080_2934mo.pdf.exe
Urgent Purchase.pdf.zip
Urgent Purchase.pdf.scr
invoice_57848592.zip
invoice_57848592.exe
invoice_2308403510_234234ko.exe
payroll.zip
invoice_10271090212-382083qo.pdf.exe
invoice_1835961892758_73r89712.pdf.exe
invoice_138490141284_23479124812esg.pdf.exe
invoice_rbs0394834783.zip
invoice_rbs0394834783.exe invoice.zip
invoice_19248961944139412_1924712oow.pdf.exe
RA9553545.pdf.zip
RA11252013.pdf.exe
invoice_2318362983713_823931342io.pdf.exe
invoice_409993234892490234_592482394zo.pdf.zip
invoice_409993234892490234_592482394zo.pdf.exe
invoice.23432.zip
invoice.23432.exe

invoice_39348104357810234832_2394813042330ro.pdf.exe
invoice.773FF.zip
invoice.773FF.exe
invoice_842592375932423943_2932394923ip.pdf.exe
invoice.23423.zip
invoice.23423.exe
invoice_23942340138302849012583_8923483923ai.pdf.exe
PO.xls.zip
PO.xls.exe

Invoice-E_4596BAC28F.zip
STATEMNT-E_FF50394573045744712-37407658458674.pdf.exe
invoice_2947294823_923794aq.pdf.exe

invoice_2305809534094380_4395802305820as.pdf.exe
Innovative pvt limited P.O185234JAN.zip
Purchase Order.pdf.scr

New-Order.xls.zip
New-Order.xls.exe

invoice.zip
invoice_423048138509183135793184_93483294892qo.pdf.exe
Payment-Slip.zip
Payment-Slip.jpg.exe
Invoice.scr
Commercial invoice.zip
Commercial invoice.scr

invoice.doc.zip
order.doc.scr
invoice_9413333084396840326_3204932044sl.pdf.exe
QUOTATION.pdf.zip
QUOTATION.exe
PURCHASE ORDER 2014.zip
list of order items 01.pdf.exe

paymentsent.zip
invoice1.exe

invoice_5eb15c5edd7fd129d85d7cc75f40d268.pdf.exe
SWIFT COPY.zip
SWIFT COPY.exe

Inv_1451857_from_US_Transpo.pdf.zip
Inv_0969044_from_US_Transpo.pdf.exe
IMG 71939823.pdf.zip
IMG 71939823.pdf.exe
kostenplan.zip
kostenplan-7676.1621.5076.1259.doc.ex
e

The Invoice_AA-N999278482.exe file in the Invoices-28-2012.zip attachment has a file size of 100,864 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x19F481447E1ADF70245582D4F4F5719C

The Invoices_12_N88283.exe file in the Invoice_N0345.zip attachment has a file size of 90,112 bytes. The MD5 checksum is the following string: 0x3A8CE3D72B60B105783D74DBC65C37A6

The Invoice_10302012_MK938.exe file in the Invoice_j5898320.zip attachment has a file size of 91,136 bytes. The MD5 checksum is the following string: 0x3D919E36029CC92724A7B9915ABD8075

The Invoice_URGN-889289.exe file in the Invoice.zip attachment has a file size of 87,040 bytes. The MD5 checksum is the following string: 0xA5C8FB478FF7788609863B83079718EC

The Invoice_1010732785.exe file in the Invoice.zip attachment has a file size of 559,104 bytes. The MD5 checksum is the following string: 0x212C44B8C955CA09277DD0B9B2D0A505

The invoice.exe file in the PURCHASE ORDER.zip attachment has a file size of 270,336 bytes. The MD5 checksum is the following string: 0x563857AE240C2970B20D8335AC95A375

A variant of invoice.exe file in the invoice.zip attachment has a file size of 263,168 bytes. The MD5 checksum is the following string: 0x2884CEC7424D31B443ADEEB7777E080C

The Invoice_QuickBooks_02_22_2013.exe file in the Invoice_QuickBooks_02_22_2013.zip attachment has a file size of 138,752 bytes. The MD5 checksum is the following string: 0xEB22580EFF7737A5DC3E822F917D37E7

The Invoices_APO2888302.doc.exe file in the Invoices.zip attachment has a file size of 114,688 bytes. The MD5 checksum is the following string: 0xA302F44D356398BB57420C14F00F3C31

The Invoice_98298997397.exe file in the Invoice_5549855.zip attachment has a file size of 135,168 bytes. The MD5 checksum is the following string: 0x1039792C2A0289C495002DDA79C13429<

The INVOICE_28781731.exe file in the INVOICE_28781731.zip attachment has a file size of 110,080 bytes. The MD5 checksum is the following string: 0xB193683BCA09B396E1161B2D21AD9D63

The Invoice_1882384.exe file in the Invoice_1882384.zip attachment has a file size of 131,584 bytes. The MD5 checksum is the following string: 0xE2231EA5E0C6EC3F4C555B75534E4708

The INVOICE_1892891.exe file in the INVOICE_1892891.zip attachment has a file size of 137,216 bytes. The MD5 checksum is the following string: 0x89705D9BB8A613A72A0E0ABFC41FBFC4

The invoice copy.exe file in the invoice copy.zip attachment has a file size of 326,656 bytes. The MD5 checksum is the following string: 0x406B950D0B16CD32172CC3F2BEC5AFA6

A variant of the invoice copy.exe file in the invoice copy.zip attachment has a file size of 331,776 bytes. The MD5 checksum is the following string: 0xEBDCD7B8468F28932F235DC7E0CD8BCD

The invoice copy(2).exe file in the invoice copy(2).zip attachment has a file size of 328,704 bytes. The MD5 checksum is the following string: 0x47B67048F5B7E48580D182ADABCC35AB

The Invoice_18803891.exe file in the Invoice_18803891.zip attachment has a file size of 133,120 bytes. The MD5 checksum is the following string: 0x0CC5C7105E02E50BBA85952F8BB9385B

A variant of the invoice copy (2).exe file in the invoice copy.zip attachment has a file size of 329,728 bytes. The MD5 checksum is the following string: 0x4E7DC191117A6F30DD429CC619041552

The invoice copy(4).exe file in the invoice copy(4).zip attachment has a file size of 343,040 bytes. The MD5 checksum is the following string: 0xA29EE1EC187CCBE93371F3C862EAB94F

A third variant of the invoice copy.exe file in the invoice copy.zip attachment has a file size of 332,800 bytes. The MD5 checksum is the following string: 0x3FC97BE8CF8E7EE60D03EAC11CEB3948

The invoice 4532.exe file in the invoice 4532.zip attachment has a file size of 246,272 bytes. The MD5 checksum is the following string: 0x99B443DFEE4AC3FEBE6809883A47E056

A fourth variant of the invoice copy.exe file in the invoice copy.zip attachment has a file size of 234,496 bytes. The MD5 checksum is the following string: 0xB86363353A73B51066E64C7495F6453B

A fifth variant of the invoice copy.exe file in the invoice copy.zip attachment has a file size of 235,520 bytes. The MD5 checksum is the following string: 0xD7E4D3D16BA86DB0693949B18438FECA

The Appliances Online - Receipt .pdf.exe file in the Appliances Online - Receipt.zip attachment has a file size of 46,360 bytes. The MD5 checksum is the following string: 0x19F1EFB08D8C3F93AB241A30E9FE1067

The Invoice_06042013.exe file in the Invoice_6992067.zip attachment has a file size of 139,776 bytes. The MD5 checksum is the following string: 0x389AC3A0963D2CF3A87F2D1CFA599DDE

The Invoice_06192013.exe file in the Invoice_1551966.zip attachment has a file size of 116,224 bytes. The MD5 checksum is the following string: 0xCC1445454C77EC6294D6D43D80B669D7

The Invoice_06202013_QBK.exe file in the concubinesip54_Invoice.zip attachment has a file size of 117,248 bytes. The MD5 checksum is the following string: 0xEB362FE45A54707D5C796E36975E88A5

A third variant of invoice.exe file in the invoice.zip attachment has a file size of 1,053,665 bytes. The MD5 checksum is the following string: 0xE149E4A42241EEAC1DE35D293466B279

The INVOICE II.exe file in the INVOICE II.zip attachment has a file size of 339,609 bytes. The MD5 checksum is the following string: 0xCFB9B78948DB332FEF04C74507F7154F

The Invoice_07162013.PDF.exe file in the Invoice_9211641.zip attachment has a file size of 117,248 bytes. The MD5 checksum is the following string: 0xECDD609C484E4B0C13E8D70C16BCF036

The invoice copy (2).exe file in the invoice-6904885 copy.zip attachment has a file size of 315,392 bytes. The MD5 checksum is the following string: 0x1D1D24C384E3AD02F1561CFADDEAB35E

The TNT invoice.exe file in the TNT invoice.zip attachment has a file size of 128,512 bytes. The MD5 checksum is the following string: 0x52BFDE0A7073611AB3F952168EB88308

The invoice-2131 copy.exe file in the invoice-2131 copy.zip attachment has a file size of 372,736 bytes. The MD5 checksum is the following string: 0xF6215433A75E0A92C343D215808EF1B6

The Invoice_3289981_381.exe file size in the Invoice_3289981_381.zip attachment is unavailable. The MD5 checksum is also unavailable.

The Invoice_18072013.exe file size in the INVOICE_cworst.zip attachment is unavailable. The MD5 checksum is also unavailable.

The Invoice.pdf.exe file in the Invoice.zip attachment has a file size of 26,776 bytes. The MD5 checksum is the following string: 0x205A596EC9BF487C1927B9C3191CEF31

The Invoice_5420-16948.exe file in the Invoice_5420-16948.zip attachment has a file size of 63,640 bytes. The MD5 checksum is the following string: 0x01254FCE92EC363DE6DA1454DC569FE6

The Invoice_08302013.exe file in the Invoice_2290567.zip attachment has a file size of 16,384 bytes. The MD5 checksum is the following string: 0x88969EDAD66820F1A19BCBC466F2A128

The Invoice_04092013.exe file in the Invoice_0416165.zip attachment has a file size of 28,160 bytes. The MD5 checksum is the following string: 0xFD50340D1BBDDA040190EF0E0BFD8ECD

The Valuation.pdf.scr file in the ValuationOfTheProperty.zip attachment has a file size of 186,584 bytes. The MD5 checksum is the following string: 0xB811F4AE3A9678340EF43DF4E9F7FBBF

The QUOTE FOR ATTCHED .pdf.scr file in the QUOTE FOR ATTCHED .pdf.zip attachment has a file size of 955,242 bytes. The MD5 checksum is the following string: 0x0B92DE8003BAEE166264D45AF7D68180

The PO #097654.pdf.exe file in the PO # 097654.pdf.zip attachment has a file size of 222,421 bytes. The MD5 checksum is the following string: 0xA04F3865F7F8DD9D1389D88AF93AF5DE

The Quotation&invoice.exe file in the Quotation_invoice.zip attachment has a file size of 334,037 bytes. The MD5 checksum is the following string: 0xEE77272CED1404D087B75DE5EEC84C7F

The Invoice_Ref.8490875904.64.pdf.exe file in the Invoice_Ref.6190303952.52.zip attachment has a file size of 143,360 bytes. The MD5 checksum is the following string: 0xA05C7C4A5342C0504A0CE439153671F1

The Invoice_092513.exe file in the Invoice_0036866.zip attachment has a file size of 26,624 bytes. The MD5 checksum is the following string: 0xB9C4166CD597A5D9F49127D1BC13AE01

The Invoice_10022013.exe file in the INVOICE_5436233.zip attachment has a file size of 25,600 bytes. The MD5 checksum is the following string: 0x1701973CFAC8AAECB4AC3D895A0CFD67

The Invoice_OCT-02-2013.exe file in the Invoice_OCT-02-2013.zip attachment has a file size of 27,648 bytes. The MD5 checksum is the following string: 0x705E1BF36292D6ACB74B8FBE20B5F7B6

The image01.exe file in the Invoice NO 0147777.zip attachment has a file size of 1,045,504 bytes. The MD5 checksum is the following string: 0x0B34CA88F60D940CC43616464FBF337F

The Invoice_26378671.exe file in the Invoice_8565469.zip attachment has a file size of 24,064 bytes. The MD5 checksum is the following string: 0xC697DBFAE872E1953B31EC859823ED40

The Invoice_101013.exe file in the Invoice_1589545.zip attachment has a file size of 24,576 bytes. The MD5 checksum is the following string: 0xEE5FAC056DA0829E898427B44B1F7BCF

The invoice_1984912_923b.pdf.exe file in the invoice.zip attachment has an approximate file size of 175,872 bytes. The MD5 checksum is not available.

The invoice_23898422_93mn.pdf.exe file in the invoice.zip attachment has a file size of 152,064 bytes. The MD5 checksum is the following string: 0x4A3DA96AACAAD3D9EFEA7F9B00F8A64F

The Invoice_10182013.exe file in the Invoice_874572087967.zip attachment has a file size of 26,624 bytes. The MD5 checksum is the following string: 0x91BE249E7A2DDB46862DE97815A35EC8

The invoice_356756245_767nu.pdf.exe file in the invoice.zip attachment has an approximate file size of 134,184 bytes. The MD5 checksum is not available.

The Urgent PO.jpg.exe file in the Urgent PO.jpg.zip attachment has a file size of 1,529,344 bytes. The MD5 checksum is the following string: 0xFB1A0DAF1E82D71200D4FA4491A57A37

The invoice_09581-590324ap.pdf.exe file in the invoice.zip attachment has a file size of 233,984 bytes. The MD5 checksum is the following string: 0x12C700409E6DB4A6E043BD3BBD3A1A21

The invoice_9238492358239_234.pdf.exe file in the invoice.zip attachment has a file size of 225,792 bytes. The MD5 checksum is the following string: 0xE40ECB37727A55F68727F83B7CE6340F

The invoice_64545_1025.exe file in the invoice_64545_1025.zip attachment has a file size of 6,656 bytes. The MD5 checksum is the following string: 0x169EA70D2D079419D7F778090665E599

The invoice_923592080_2934mo.pdf.exe file in the invoice.zip attachment has a file size of 265,728 bytes. The MD5 checksum is the following string: 0x249BB15AD6554D75E3AFA95A5AD54EEB

The Urgent Purchase.pdf.scr file in the Urgent Purchase.pdf.zip attachment has a file size of 470,488 bytes. The MD5 checksum is the following string: 0xF58A0341107E9F3A0CDB89F1AD19DF27

The invoice_57848592.exe file in the invoice_57848592.zip attachment has a file size of 29,696 bytes. The MD5 checksum is the following string: 0x27938E57F7928E9559E71D384A8FFFE6

The invoice_2308403510_234234ko.exe file in the invoice.zip attachment has a file size of 281,600 bytes. The MD5 checksum is the following string: 0x4615CE884B41C65BE82B88FA06872F4B

The invoice_10271090212-382083qo.pdf.exe file in the payroll.zip attachment has a file size of 241,152 bytes. The MD5 checksum is the following string: 0x16985A93D843E88C5233EF9D5CEF7C07

The invoice_1835961892758_73r89712.pdf.exe file in the invoice.zip attachment has a file size of 235,008 bytes. The MD5 checksum is the following string: 0x8F8441E3E8A949D56D05A5A7B5509526

The invoice_138490141284_23479124812esg.pdf.exe file in the invoice.zip attachment has a file size of 223,744 bytes. The MD5 checksum is the following string: 0xA1CF6344F7D70384995B281603EE3369

The invoice_rbs0394834783.exe file in the invoice_rbs0394834783.zip attachment, file size is not available. The MD5 checksum is also unavailable.

The invoice_19248961944139412_1924712oow.pdf.exe file in the invoice.zip attachment has a file size of 236,032 bytes. The MD5 checksum is the following string: 0xECE598934072DF2EE3DBB75C08B3B8C4

The RA11252013.pdf.exe file in the RA9553545.pdf.zip attachment has a file size of 18,944 bytes. The MD5 checksum is the following string: 0x2A42835BF604CA1BCB57D010721639D3

The invoice_2318362983713_823931342io.pdf.exe file in the invoice.zip attachment has a file size of 252,928 bytes. The MD5 checksum is the following string: 0xEA039A854D20D7734C5ADD48F1A51C34


The invoice_409993234892490234_592482394zo.pdf.exe file in the invoice_409993234892490234_592482394zo.pdf.zip attachment has a file size of 164,457 bytes. The MD5 checksum is the following string: 0x4D26D43E1DD3ACCFFA50E9F506D719D6

The invoice.23432.exe file in the invoice.23432.zip attachment has a file size of 86,016 bytes. The MD5 checksum is the following string: 0xE8457489F140FCEE62C3DD5A052DE40F

The invoice_39348104357810234832_2394813042330ro.pdf.exe file in the invoice.zip attachment has a file size of 83,799 bytes. The MD5 checksum is the following string: 0x15DAFE9DE49A7F12D07378AD30F35F86

The invoice.773FF.exe file in the invoice.773FF.zip attachment has a file size of 106,496 bytes. The MD5 checksum is the following string: 0x80FA38365A3BC985DFE67CB46567857C

The invoice_842592375932423943_2932394923ip.pdf.exe file in the invoice.zip attachment has a file size of 83,680 bytes. The MD5 checksum is the following string: 0x9419A9E3DE68AF9ECFB5C51F1A12FA

The invoice.23423.exe file in the invoice.23423.zip attachment has a file size of 110,592 bytes. The MD5 checksum is the following string: 0x01958A00512E132593F6119850E18A6F

The invoice_23942340138302849012583_8923483923ai.pdf.exe file in the invoice.zip attachment has a file size of 82,183 bytes. The MD5 checksum is the following string: 0x6F43A16E5BD711D33D501F063FE74F9F

The PO.xls.exe file in the PO.xls.zip attachment has a file size of 266,752 bytes. The MD5 checksum is the following string: 0xEB4F4CD318670FC93D2A4F89202D7A08


The STATEMNT-E_FF50394573045744712-37407658458674.pdf.exe file in the Invoice-E_4596BAC28F.zip attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x051DD6888C6C6611342965B7F11402F8

The invoice_2947294823_923794aq.pdf.exe file in the invoice.zip attachment has a file size of 85,243 bytes. The MD5 checksum is the following string: 0xA037FE0941D79AE04A009027542B3F32

The invoice_2305809534094380_4395802305820as.pdf.exe file in the invoice.zip attachment has a file size of 78,168 bytes. The MD5 checksum is the following string: 0xDC8B263F0364A92652B08A518A94BE16

The Purchase Order.pdf.scr file in the Innovative pvt limited P.O185234JAN.zip attachment has a file size of 1,274,641 bytes. The MD5 checksum is the following string: 0x5BCEC294645D8373442F548E54639196


The New-Order.xls.exe file in the New-Order.xls.zip attachment has a file size of 274,944 bytes. The MD5 checksum is the following string: 0x2A12CDD9B0A856362EC91E485DFFD928

The invoice_423048138509183135793184_93483294892qo.pdf.exe file in the invoice.zip attachment has a file size of 84,194 bytes. The MD5 checksum is the following string: 0x1D73767AEC15929FF75DE3C70A4190BE

A variant of the invoice copy(2).exe file in the invoice copy(2).zip attachment has a file size of 106,496 bytes. The MD5 checksum is the following string: 0x1BFF45D05373AB480C732B51469C9895

The Payment-Slip.jpg.exe file in the Payment-Slip.zip attachment has a file size of 955,280 bytes. The MD5 checksum is the following string: 0xDD2A90D43BCD49A93898BD18A6897C90

The Invoice.scr file in the Invoice.zip attachment has an approximate file size of 621,721 bytes. The MD5 checksum is not available.

A variant of the Invoice.scr file in the Invoice.zip attachment has a file size of 1,133,328 bytes. The MD5 checksum is the following string: 0xDD8CAD88D993A4DE040A9909E36E91B1


The Commercial invoice.scr file in the Commercial invoice.zip attachment has a file size of 1,085,584 bytes. The MD5 checksum is the following string: 0x9D4B90F21612E05F6D5BD8BE3A5A519F

The order.doc.scr file in the invoice.doc.zip attachment has a file size of 1,110,901 bytes. The MD5 checksum is the following string: 0xD107DBAC1E275A8813F9DAB3B203D5B9

The invoice_9413333084396840326_3204932044sl.pdf.exe file in the invoice.zip attachment has a file size of 85,562 bytes. The MD5 checksum is the following string: 0x2E81A16416D8168B855BC072C51D000B


The QUOTATION.exe file in the QUOTATION.pdf.zip attachment has a file size of 1,041,007 bytes. The MD5 checksum is the following string: 0x3AAC753F8C95A00F379D6014D4F68AD3

A fourth variant of the invoice.exe file in the invoice.zip attachment has a file size of 844,800 bytes. The MD5 checksum is the following string: 0x144258E6C03E708F9C71B891E5BD40FA

The list of order items 01.pdf.exe file in the PURCHASE ORDER 2014.zip attachment has a file size of 457,728 bytes. The MD5 checksum is the following string: 0x23B6A5377CB2CDBF77C98CB7F2FCE93B


The invoice1.exe file in the paymentsent.zip attachment has a file size of 832,512 bytes. The MD5 checksum is the following string: 0x68F26BA97C243BB42F445D6BB9726472

The invoice_5eb15c5edd7fd129d85d7cc75f40d268.pdf.exe file in the invoice.zip attachment has a file size of 96,348 bytes. The MD5 checksum is the following string: 0x5EB15C5EDD7FD129D85D7CC75F40D268

A fifth variant of the INVOICE.exe file in the INVOICE.zip attachment has a file size of 874,542 bytes. The MD5 checksum is the following string: 0xA5887FA72EBF2C442EF8CD4E4CD9E9B3


The SWIFT COPY.exe file in the SWIFT COPY.zip attachment has an approximate file size of 496,128 bytes. The MD5 checksum is the following string: e80768c57c5a9ada9bb6cfe6c7427551


The Inv_0969044_from_US_Transpo.pdf.exe file in the Inv_1451857_from_US_Transpo.pdf.zip attachment has a file size of 110,592 bytes. The MD5 checksum is the following string: 0xC2D1B9B6C961CC3854E03F811C37E824

The IMG 71939823.pdf.exe file in the IMG 71939823.pdf.zip attachment has a file size of 494,592 bytes. The MD5 checksum is the following string: 0x03978F9309BDB5823CC480C5C8BF541B


The kostenplan-7676.1621.5076.1259.doc.exe file in the kostenplan.zip attachment has a file size of 48,640 bytes. The MD5 checksum is the following string: 0xE67F65412E16219CC78FAE80C66CD524

The following text is a sample of the email message that is associated with this threat outbreak:

Subject: Re: FW: End of Aug. Statement Reqiured

Message Body:

Hi,
as reqeusted I give you inovices issued to you per sept.
Regards

Or

Subject: Re: Inter-company invoice from Boyd Gaming Corp.

Message Body:

Hi
Attached the intercompany inv. for the period July 2012 til Aug. 2012.
Thanks a lot for supporting this process
DENEEN Herndon
Boyd Gaming Corp.

Or

Subject: Re: FW: End of Aug. Statement required

Message Body:

Good day,
as reqeusted I give you inovices issued to you per july (Microsoft Word format).

Regards
FLO Barret

Or

Subject: Missed package delivery!

Message Body:

Dear client,
We attempted to deliver your item at 08:44 am on Jan 30th, 2013.
The delivery attempt failed because nobody was present at the shipping address, so this notification has been automatically sent.
You may arrange redelivery or pick up the item at the U.S. Post Office indicated on the receipt.
If the package is not scheduled for redelivery or picked up within 48 hours, it will be returned to the sender.

Or

Subject: Please respond - overdue payment

Message Body:

Please find attached your invoices for the past months. Remit the payment by 02/25/2013 as outlines under our "Payment Terms" agreement.
Thank you for your business,
Sincerely,
Terrell Rodriquez
This email has been sent from an automated system. PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify your representative immediately and delete this message from your computer. Thank you.

Or

Subject: Re: FW: End of Aug. Statement Reqiured

Message Body:

Hallo,
as reqeusted I give you inovices issued to you per dec. 2012 ( Internet Explorer/Mozilla Firefox file)
Regards

Or

Subject: Invoice #5549855 - Remit file

Message Body:

Attached is the invoice (Invoice_5549855.zip) received from your bank.
Please print this label and fill in the requested information. Once you have filled out all the information on
the form please send it to hkma_invoice@hkma.gov.hk .
For more details please see the attached file.
Please do not reply to this email, it is an unmonitored mailbox!
Thank you ,
HONG KONG MONETARY AUTHORITY 55th Floor Two International Finance Centre 8 Finance Street Central Hong Kong
© 2013 Hong Kong Monetary Authority. All rights reserved.
*******************************************************************
This email is confidential. It may also be legally privileged.
If you are not the addressee you may not copy, forward, disclose
or use any part of it. If you have received this message in error,
please delete it and all copies from your system and notify the
sender immediately by return email.
Internet communications cannot be guaranteed to be timely,
secure, error or virus-free. The sender does not accept liability
for any errors or omissions.
*******************************************************************

Or

Subject: Please respond - overdue payment

Message Body:

Please find attached your invoices for the past months. Remit the payment by 04/29/2013 as outlines under our "Payment Terms" agreement.
Thank you for your business,
Sincerely,
Esteban Benton
This email has been sent from an automated system. PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify your representative immediately and delete this message from your computer. Thank you.

Or

Subject: invoice copy

Message Body:

Kindly open to see export License and payment invoice attached,
meanwhile we sent the balance payment yesterday.
Please confirm if it has settled in your account or you can call if
there is any problem.
Thanks
Karen parker

Or

Subject: Invoice #6992067 - Remit file

Message Body:

Attached is the invoice (Invoice_6992067.zip) received from your bank.
Please print this label and fill in the requested information. Once you have filled out
all the information on the form please send it to payroll.invoices@adp.com.
For more details please see the attached file.
Please do not reply to this email, it is an unmonitored mailbox!
Thank you ,
Automatic Data Processing, Inc.
1 ADP Boulevard
Roseland
NJ 07068
© Automatic Data Processing, Inc. (ADP®) . All rights reserved.
*******************************************************************
This email is confidential. It may also be legally privileged.
If you are not the addressee you may not copy, forward, disclose
or use any part of it. If you have received this message in error,
please delete it and all copies from your system and notify the
sender immediately by return email.
Internet communications cannot be guaranteed to be timely,
secure, error or virus-free. The sender does not accept liability
for any errors or omissions.
*******************************************************************

Or

Subject: Please respond - overdue payment

Message Body:

Please find attached your invoices for the past months. Remit the payment by 07/18/2013 as outlines under our "Payment Terms" agreement.
Thank you for your business,
Sincerely,
Lydia Woods
This email has been sent from an automated system. PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify your representative immediately and delete this message from your computer. Thank you.

Or

Subject: Please respond - overdue payment

Message Body:

Please find attached your invoices for the past months. Remit the payment by
07/18/2013 as outlines under our "Payment Terms" agreement.
Thank you for your business,
Sincerely,
Garth Gaston
This email has been sent from an automated system. PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential
and protected from disclosure. If the reader of this message is not the
intended recipient, or an employee or agent responsible for delivering this
message to the intended recipient, you are hereby notified that any
dissemination, distribution or copying of this communication is strictly
prohibited. If you have received this communication in error, please notify
your representative immediately and delete this message from your computer.
Thank you.

Or

Subject: TNT UK Limited Self Billing Invoice 6252701943

Message Body:

Download the attachment. Invoice will be automatically shown by double click.

Or

Subject: Fwd: 5420-16948 payment has been received

Or

Message Body:

Please find in attached the copy of Order and also let me know the
payment terms and delivery time
*Best Regards,
Vivian Wie
*Front Desk Assistant*
*P.O Box 37008, Doha – Qatar*
*Mob: 74461994, Tel : 4460 3078*
*Mail: afexdoha@afexcargo.com, *
*Web: www.afexmiddleeast.com*

Or

Subject: Your UPS Invoice(s)

Message Body:

UPS Billing Center
This is an automatically generated email. Please do not reply to this email address.
Dear UPS Customer,
New invoice(s) are available for the consolidated payment plan(s) / account(s) enrolled in the UPS Billing Center
Your new UPS invoice(s) is attached
Discover more about UPS:
Visit ups.com
Explore UPS Freight Services
Learn About UPS Companies
Sign Up For Additional Email From UPS
Read Compass Online
(c) 2013 United Parcel Service of America, Inc. UPS, the UPS brandmark, and the color brown are trademarks of United Parcel Service of America, Inc. All rights reserved.
For more information on UPS's privacy practices, refer to the UPS Privacy Policy.
Please do not reply directly to this email. UPS will not receive any reply message.
For questions or comments, visit Contact UPS.
This communication contains proprietary information and may be confidential. If you are not the intended recipient, the reading, copying, disclosure or other use of the contents of this email is strictly prohibited and you are instructed to please delete this email immediately.
Privacy Policy

Or

Subject: FW: Invoice 0036866

Message Body:

Your invoice is attached.
Sincerely,
Constance Rowell
This email has been sent from an automated system. PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify your representative immediately and delete this message from your computer.

Or

Subject: FW: Invoice 5714154

Message Body:

Your invoice is attached.
Sincerely,
Issac Spicer
This email has been sent from an automated system. PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify your representative immediately and delete this message from your computer.

Or

Subject: Fwd: Payroll Invoice

Message Body:

ADP TotalSource
A copy of your ADP TotalSource Payroll Invoice for the following payroll is is attached in PDF file and available for viewing.
Year: 13
Week No: 08
Payroll No: 1
Please open attached file to view and check following payrol
This email was generated by an automated notification system. If you have any questions regarding the invoice or you have misplaced your
MyTotalSource login information, please contact your Payroll Service Representative. Please do not reply to the email directly.
© 2013 Automatic Data Processing, Inc.

Or

Subject: Payroll Invoice

Message Body:

ADP TotalSource
A copy of your ADP TotalSource Payroll Invoice for the following payroll is is attached in PDF file and available for viewing.
Year: 13
Week No: 08
Payroll No: 1
Please open attached file to view and check following payrol
This email was generated by an automated notification system. If you have any questions regarding the invoice or you have misplaced your
MyTotalSource login information, please contact your Payroll Service Representative. Please do not reply to the email directly.
© 2013 Automatic Data Processing, Inc.

Or

Subject: Response to Delivered Fax

Message Body:

The attached mail was received in response to a Fax2Mail user
for which you are listed as an administrator.
We were unable to process your recent transaction. Please verify your details and try again.
If the problem persists, contact us to complete your order.
Transaction details are shown in the attached file.
Reference #874572087967
This email has been sent from an automated system.
PLEASE DO NOT REPLY.
The information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify your representative immediately and delete this message from your computer. Thank you.

Or

Message Body:

Hello Sir,
Due to urgent request of your product this season, We will like to make an inquiry for the compressed attached Product.
Kindly provide us with the following information,
1. Prices FOB
2. Payment terms
3. Delivery Period
4. MOQ
5. Specified delivery date assuming from the Date of Order.
Your quick reply will be highly appreciated.
Regards,
Annabel Webb

Or

Subject: RE: URGENT PURCHASE ORDER

Message Body:

Good day.
please kindly find attachment of our new purchase order and get back to us with the FOB price ASAP.
BEST REGARDS
Ms. Martina Zhang

Or

Message Body:

Your invoice is attached. Please remit payment at your earliest convenience.

Or

Subject: Payroll Invoice

Message Body:

ADP TotalSource
A copy of your ADP TotalSource Payroll Invoice for the following payroll is is attached in PDF file and available for viewing.
Year: 13
Week No: 08
Payroll No: 1
Please open attached file to view and check following payrol
This email was generated by an automated notification system. If you have any questions regarding the invoice or you have misplaced your
MyTotalSource login information, please contact your Payroll Service Representative. Please do not reply to the email directly.
© 2013 Automatic Data Processing, Inc.

Or

Subject: Could not process Online Submission for Reference 475/RA9553545

Message Body:

We could not process your Full Payment Submission.
The submission for reference 475/RA9553545 was successfully received and was not processed.
Check attached copy for more information.
This is an automatically generated email. Please do not reply as the email address is not monitored for received mail.

Or

Subject: Amazon Order details: Invoice 84104

Message Body:

Good day,
Thanks for your order. We’ll let you know once your item(s) have dispatched.You can view the status of your order or make changes to it by visiting Your Orders on Amazon.com.
Order Details
Order PD6514328 Placed on December 9, 2013
Order details and invoice in attached file.
Need to make changes to your order? Visit our Help page for more information and video guides.

We hope to see you again soon. Amazon.com

Or

Message Body:

Hey dear,
Please note that the amount outstanding as of 20 Jan 2014 is USD 126,615.70.
The above amount is calculated as follows:
Value of the goods shipped to you: USD 496,350.7
79.029 MT in 4 containers @ USD 3000 per MT - USD 237,087
43.886 MT in 2 trucks @ USD 2950 per MT - USD 129,463.7
44 MT in 2 trucks @ USD 2950 per MT - USD 129,800
Value of the amounts we received from you: USD 369,735.0
PMT 1 - USD 119,950.00
PMT 2 - USD 119,950.00
PMT 3 - USD 64867.5
PMT 4 - USD 64967.5
Attched, please find commercial invoice for USD 126,615.70.
According to your email, we will transfer this on next week Monday.
Kind regards,
Yu wang

Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco Virus Outbreak Filters protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco web security appliances will not be impacted by these attacks. Cisco appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network
 
Alert History
 

Version 77, March 18, 2014, 8:38 AM: Cisco Security has detected significant activity on March 17, 2014.

Version 76, February 24, 2014, 9:04 AM: Cisco Security has detected significant activity on February 21, 2014.

Version 75, February 3, 2014, 9:05 AM: Cisco Security has detected significant activity on January 31, 2014.

Version 74, January 31, 2014, 9:06 AM: Cisco Security has detected significant activity on January 30, 2014.

Version 73, January 30, 2014, 7:52 AM: Cisco Security has detected significant activity on January 28, 2014.

Version 72, January 29, 2014, 8:50 AM: Cisco Security has detected significant activity on January 28, 2014.

Version 71, January 28, 2014, 8:51 AM: Cisco Security has detected significant activity on January 27, 2014.

Version 70, January 24, 2014, 12:21 PM: Cisco Security has detected significant activity on January 23, 2014.

Version 69, January 23, 2014, 7:17 AM: Cisco Security has detected significant activity on January 22, 2014.

Version 68, January 17, 2014, 8:59 AM: Cisco Security has detected significant activity on January 16, 2014.

Version 67, January 14, 2014, 10:25 AM: Cisco Security has detected significant activity on January 13, 2014.

Version 66, January 13, 2014, 9:07 AM: Cisco Security has detected significant activity on January 10, 2014.

Version 65, January 9, 2014, 11:17 AM: Cisco Security has detected significant activity on January 8, 2014.

Version 64, January 7, 2014, 8:31 AM: Cisco Security has detected significant activity on December 30, 2013.

Version 63, January 3, 2014, 10:44 AM: Cisco Security has detected significant activity on December 27, 2013.

Version 62, December 23, 2013, 8:35 AM: Cisco Security has detected significant activity on December 20, 2013.

Version 61, December 18, 2013, 8:43 AM: Cisco Security has detected significant activity on December 17, 2013.

Version 60, November 26, 2013, 10:06 AM: Cisco Security has detected significant activity on November 25, 2013.

Version 59, November 18, 2013, 10:29 PM: Cisco Security has detected significant activity on November 18, 2013.

Version 58, November 14, 2013, 4:11 PM: Cisco Security has detected significant activity on November 13, 2013.

Version 57, November 12, 2013, 4:19 PM: Cisco Security has detected significant activity on November 11, 2013.

Version 56, November 6, 2013, 5:01 PM: Cisco Security has detected significant activity on November 5, 2013.

Version 55, November 5, 2013, 6:50 PM: Cisco Security has detected significant activity on November 4, 2013.

Version 54, October 30, 2013, 7:49 PM: Cisco Security has detected significant activity on October 30, 2013.

Version 53, October 29, 2013, 1:27 PM: Cisco Security has detected significant activity on October 28, 2013.

Version 52, October 28, 2013, 2:08 PM: Cisco Security has detected significant activity on October 25, 2013.

Version 51, October 24, 2013, 4:39 PM: Cisco Security has detected significant activity on October 23, 2013

Version 50, October 23, 2013, 1:56 PM: Cisco Security has detected significant activity on October 22, 2013.

Version 49, October 21, 2013, 2:42 PM: Cisco Security has detected significant activity on October 20, 2013.

Version 48, October 18, 2013, 8:07 PM: Cisco Security has detected significant activity on October 18, 2013.

Version 47, October 17, 2013, 7:39 PM: Cisco Security has detected significant activity on October 17, 2013.

Version 46, October 17, 2013, 2:22 PM: Cisco Security has detected significant activity on October 16, 2013.

Version 45, October 10, 2013, 2:23 PM: Cisco Security has detected significant activity on October 10, 2013.

Version 44, October 9, 2013, 12:35 PM: Cisco Security has detected significant activity on October 9, 2013.

Version 43, October 3, 2013, 2:17 PM: Cisco Security has detected significant activity on October 3, 2013.

Version 42, October 2, 2013, 6:44 PM: Cisco Security has detected significant activity on October 2, 2013.

Version 41, October 2, 2013, 2:34 PM: Cisco Security has detected significant activity on October 2, 2013.

Version 40, September 25, 2013, 7:32 PM: Cisco Security has detected significant activity on September 25, 2013.

Version 39, September 25, 2013, 5:38 PM: Cisco Security has detected significant activity on September 25, 2013.

Version 38, September 19, 2013, 2:58 PM: Cisco Security has detected significant activity on September 18, 2013.

Version 37, September 17, 2013, 2:13 PM: Cisco Security has detected significant activity on September 16, 2013.

Version 36, September 16, 2013, 1:53 PM: Cisco Security has detected significant activity on September 15, 2013.

Version 35, September 9, 2013, 2:47 PM: Cisco Security has detected significant activity on September 6, 2013.

Version 34, September 4, 2013, 1:14 PM: Cisco Security has detected significant activity on September 3, 2013.

Version 33, August 30, 2013, 12:44 PM: Cisco Security has detected significant activity on August 29, 2013.

Version 32, July 24, 2013, 6:33 PM: Cisco Security has detected significant activity on July 24, 2013.

Version 31, July 19, 2013, 3:58 PM: Cisco Security has detected significant activity on July 19, 2013.

Version 30, July 19, 2013, 12:17 PM: Cisco Security has detected significant activity on July 18, 2013.

Version 29, July 18, 2013, 2:28 PM: Cisco Security has detected significant activity on July 18, 2013.

Version 28, July 16, 2013, 7:59 PM: Cisco Security has detected significant activity on July 15, 2013.

Version 27, July 5, 2013, 1:37 PM: Cisco Security has detected significant activity on July 3, 2013.

Version 26, July 1, 2013, 5:12 PM: Cisco Security has detected significant activity on June 30, 2013.

Version 25, June 21, 2013, 1:24 PM: Cisco Security has detected significant activity on June 20, 2013.

Version 24, June 19, 2013, 3:55 PM: Cisco Security has detected significant activity on June 18, 2013.

Version 23, June 4, 2013, 8:09 PM: Cisco Security has detected significant activity on June 4, 2013.

Version 22, May 29, 2013, 4:53 PM: Cisco Security has detected significant activity on May 28, 2013.

Version 21, May 24, 2013, 7:36 PM: Cisco Security has detected significant activity on May 23, 2013.

Version 20, May 23, 2013, 1:02 PM: Cisco Security has detected significant activity on May 22, 2013.

Version 19, May 22, 2013, 3:21 PM: Cisco Security has detected significant activity on May 21, 2013.

Version 18, May 21, 2013, 3:29 PM: Cisco Security has detected significant activity on May 21, 2013.

Version 17, May 20, 2013, 3:39 PM: Cisco Security has detected significant activity on May 20, 2013.

Version 16, May 17, 2013, 2:19 PM: Cisco Security has detected significant activity on May 16, 2013.

Version 15, May 16, 2013, 2:46 PM: Cisco Security has detected significant activity on May 16, 2013.

Version 14, May 15, 2013, 5:35 PM: Cisco Security has detected significant activity on May 15, 2013.

Version 13, April 30, 2013, 3:38 PM: Cisco Security has detected significant activity on April 29, 2013.

Version 12, April 12, 2013, 11:24 AM: Cisco Security has detected significant activity on April 12, 2013.

Version 11, April 1, 2013, 1:56 PM: Cisco Security has detected significant activity on March 29, 2013.

Version 10, March 27, 2013, 1:43 PM: Cisco Security has detected significant activity on March 27, 2013.

Version 9, February 27, 2013, 7:16 AM:
Cisco Security has detected significant activity on February 26, 2013.

Version 8, February 22, 2013, 11:45 AM: Cisco Security has detected significant activity on February 22, 2013.

Version 7, February 1, 2013, 7:53 AM: Cisco Security has detected significant activity on January 31, 2013.

Version 6, January 22, 2013, 8:12 AM: Cisco Security has detected significant activity on January 21, 2013.

Version 5, January 2, 2013, 6:59 AM: Cisco Security has detected significant activity on December 27, 2012.

Version 4, November 7, 2012, 8:03 AM: Cisco Security has detected significant activity on November 6, 2012.

Version 3, November 1, 2012, 5:56 AM: Cisco Security has detected significant activity on October 31, 2012.

Version 2, October 26, 2012, 3:45 PM: Cisco Security has detected significant activity on October 26, 2012.

Version 1, October 1, 2012, 5:39 PM: Cisco Security has detected significant activity on October 1, 2012.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield