Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Threat Outbreak Alert

Threat Outbreak Alert: Fake Meeting Invitation Email Messages on December 9, 2013

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:31616
Version:7
First Published:2013 November 04 20:45 GMT
Last Published:2013 December 10 13:39 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Mild Damage
 
 
Version Summary:Cisco Security has detected significant activity on December 9, 2013.
 

Description
 
Cisco Security has detected significant activity related to spam email messages that claim to contain a meeting invitation for the recipient. The text in the email message attempts to convince the recipient to open the attachment for details. However, the .zip attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID7699 and RuleID7699kvr) may contain any of the following files:

invitation55B9934710.zip
invit.exe
Payment Slip.zip
wire.exe
order.zip
Payments.exe
Payment Receipt.zip
Payment Receipt.exe
transfer.exe
Details.zip
wire slip.exe
payment.exe
payment slip.EXE

The invit.exe file in the invitation55B9934710.zip attachment has a file size of 95,545 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x4BC8CBA2163093C0A3764C592B32EDCE

The wire.exe file in the Payment Slip.zip attachment has a file size of 320,512 bytes. The MD5 checksum is the following string: 0xECCFA025102679ED7C99A4BC58D4E8EE

The Payments.exe file in the order.zip attachment has a file size of 1,525,760 bytes. The MD5 checksum, is the following string: 0x278C8DE2614522652104F5BDAEB79578

The Payment Receipt.exe file in the Payment Receipt.zip attachment has a file size of 420,864 bytes. The MD5 checksum is the following string: 0x45EC79A989DFAF3A788FC28AA87509EA

The transfer.exe file in the payment slip.zip attachment has a file size of 304,640 bytes. The MD5 checksum is the following string: 0xA8876869A9A7087A56A8A24DFFBE1C

The wire slip.exe file in the Payment Details.zip attachment has a file size of 1,245,184 bytes. The MD5 checksum is the following string: 0x0D2C41601203F47993C6649F1296808E

The payment.exe file in the Payment Slip.zip attachment has a file size of 900,672 bytes. The MD5 checksum is the following string: 0x6A859AB3C25D609EE3C1B2210E774DB4

The payment slip.EXE file in the payment slip.zip attachment has a file size of 1,697,792 bytes. The MD5 checksum is the following string: 0x559EDD76A1D5FF0462143B50C9D1EAD4

The following text is a sample of the email message that is associated with this threat outbreak:

Message Body:

Good morning,
Please find attached the above, which I thought that you maybe interested in attending.
Kind Regards.
Graham Nevin
Senior Relationship Manager
Commercial Banking
NatWest
1 St Paul's Place
121 Norfolk Street
Sheffield S1 2JF
Telephone: 0114 2066516
Fax: 0114 2723130
Mobile: 07801 194982
Email: graham.nevin@rbs.co.uk
National Westminster Bank Plc, Registered in England No. 929027. Registered Office: 135 Bishopsgate, London EC2M 3UR.
Authorised and regulated by the Financial Services Authority.
This email message is confidential and for use by the addressee only. If the message is received by anyone other than the addressee, please return the message to the sender by replying to it and then delete the message from your computer.
Internet emails are not necessarily secure. National Westminster Bank Plc does not accept responsibility for changes made to this message after it was sent. National Westminster Bank Plc may monitor emails for business and operational purposes. By replying to this message you give your consent to our monitoring of your email communications with us.
Whilst all reasonable care has been taken to avoid the transmission of viruses, it is the responsibility of the recipient to ensure that the onward transmission, opening or use of this message and any attachments will not adversely affect its systems or data. No responsibility is accepted by National Westminster Bank Plc in this regard and the recipient should carry out such virus and other checks as it considers appropriate.
Supporting your business ambitions www.natwest.com/ahead
Picture (Metafile)

Or

Message Body:

please check attachment to view our order.

Or

Subject: Fw: Money was transferred from your account

Message Body:

Dear Customer,

We discovered an unusual activities on your Online Bank
Account. Someone transferred some money from your account.
Kindly download the payment statement to cancel the
transaction.

Regards,
Online Bank Team.

Or

Subject: payment slip

Message Body:

Sir,
Attached is the payment slip of the payment made into your account today.
Please confirm that the account details are correct as attached .
Looking forward to hear from you.
Thanks & Regards
Rita Chan

Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network
 
Alert History
 

Version 6, December 3, 2013, 4:38 PM: Cisco Security has detected significant activity on December 2, 2013.

Version 5, November 18, 2013, 4:54 PM: Cisco Security has detected significant activity on November 15, 2013.

Version 4, November 15, 2013, 4:07 PM: Cisco Security has detected significant activity on November 15, 2013.

Version 3, November 11, 2013, 9:25 PM: Cisco Security has detected significant activity on November 9, 2013.

Version 2, November 6, 2013, 3:56 PM: Cisco Security has detected significant activity on November 6, 2013.

Version 1, November 4, 2013, 8:45 PM: Cisco Security has detected significant activity on November 4, 2013.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield