Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Threat Outbreak Alert

Threat Outbreak Alert: Fake Purchase Order Confirmation E-mail Messages on April 5, 2013

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:27031
Version:7
First Published:2012 September 24 21:00 GMT
Last Published:2013 April 08 16:47 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Mild Damage
 
 
Version Summary:Cisco Security Intelligence Operations has detected significant activity on April 5, 2013.
 

Description
 
Cisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain purchase order information for the recipient. The text in the e-mail message attempts to persuade the recipient to open the attachment and view the details. However, the .zip attachment contains a malicious .scr file that, when executed, attempts to infect the system with malicious code.

E-mail messages that are related to this threat (RuleID4572KVR) may contain the following files:

Order.zip
deCrypted.scr
Nota_fiscal_222239460.zip
nota_fiscal_0124511254892.scr
Purchase Order.zip
Purchase Order.scr
Order.scr
Payment Slip.zip
P.I.exe
PO-01.zip
New ans (2).scr
dddddd.exe
PAYMENT CONFIRMATION.zip
GoZiE.exe

The deCrypted.scr file in the Order.zip attachment has a file size of 614,517 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x633CB6E07CC421BF85DAAC4D526547FF

The nota_fiscal_0124511254892.scr file in the Nota_fiscal_222239460.zip attachment has a file size of 488,960 bytes. The MD5 checksum is the following string: 0xAE4E3A5621F4DA6F1D5EA4F89DE51F3D

The Purchase Order.scr file in the Purchase Order.zip attachment has a file size of 311,808 bytes. The MD5 checksum is the following string: 0x6AA7790DCC16D8FC7744B0DFEA078351

The Order.scr file in the Order.zip attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0x4D8C758A655188B16DD9F97115DE44BA

The P.I.exe file in the Payment Slip.zip attachment has a file size of 688,418 bytes. The MD5 checksum is the following string: 0x65AD9CFCB8D9F6BA35353520084168A7

The New ans (2).scr file in the PO-01.zip attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0xF64E0E61E92E590E46C57C369A559489

The dddddd.exe file in the Payment Slip.zip attachment has a file size of 985,817 bytes. The MD5 checksum is the following string: 0x3DCDC74C308287F2A043283930B06EC7

The GoZiE.exe file in the PAYMENT CONFIRMATION.zip attachment has a file size of 287,232 bytes. The MD5 checksum is the following string: 0x1CFC7C73B16845F3A063E07551095D1F

The following text is a sample of the e-mail message that is associated with this threat outbreak:

Subject: TRIAL PURCHASE ORDER CONFIRMATION...

Message Body:

Dear Sir,
Kindly check the attached purchase order and arrange to despatch the materials as soon as possible.
Take action with respect to the consolidation of the purchase order above.
Regards
zjang lee
----- End forwarded message -----

Or

Message Body:

Esta mensagem refere-se à Nota Fiscal NFS-e No. 0004514823624
emitida pelo prestador de serviços:
Razão Social: AMERICANAS.COM COMÉRCIO DE ELETRÔNICOS LTDA.
E-mail: contato@americanas.com
CCM : 3.218.906-0
CNPJ: 01.109.184/0004-38
COMPRA DEBITADO EM SEU CARTÃO EM 3 VESES SEM JUROS.
SEGUE ANEXO NOTA FISCAL E PRAZO DE ENTREGA..

Or

Subject: Purchase Order For January

Message Body:

Hello,
I have attached the signed purchase order list. Please confirm same so
we could expedite action on the process.
Please review and send us the PI to enable us make payment.
Thank you,
Natalwa Prudinina
Supervisor / Purchasing

Or

Subject: Re: Payment Slip.

Message Body:

Happy New Year to you. My Name is Mario Danilo. My colllegue contacted you last year as regards your products.
We have resumed for the year 2013 and we are ready to make purchase as earlier agreed.
Pls find attached the payment Confirmation slip of 30% via TT Bank Transfer. We will make complete  payment on our previously agreed terms.
Please get back to me if you need any more clarification.
Yours Sincerely
Head Accounting Department
Mario Danilo

Cisco Security Intelligence Operations analysts examine real-world e-mail traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global e-mail security threats and trends. Cisco will continue to monitor this threat and automatically adapt IronPort systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. E-mail that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam e-mail and hostile web URLs from being passed to the end user.

Related Links
Cisco Security Intelligence Operations
Cisco Threat Operations Center
Cisco SenderBase Security Network
 
Alert History
 

Version 6, March 15, 2013, 10:29 PM: Cisco Security Intelligence Operations has detected significant activity on March 15, 2013.

Version 5, January 22, 2013, 8:19 AM: Cisco Security Intelligence Operations has detected significant activity on January 20, 2013.

Version 4, January 18, 2013, 10:21 AM: Cisco Security Intelligence Operations has detected significant activity on January 18, 2013.

Version 3, January 2, 2013, 7:06 AM: Cisco Security Intelligence Operations has detected significant activity on December 28, 2012.

Version 2, November 27, 2012, 7:20 AM: Cisco Security Intelligence Operations has detected significant activity on November 27, 2012.

Version 1, September 24, 2012, 1:00 PM: Cisco Security Intelligence Operations has detected significant activity on September 22, 2012.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield