Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Threat Outbreak Alert

Threat Outbreak Alert: Fake Product Order Email Messages on June 2, 2014

 
Threat Type:IntelliShield: Threat Outbreak Alert
IntelliShield ID:27634
Version:50
First Published:2012 December 13 15:21 GMT
Last Published:2014 June 04 13:52 GMT
Port: Not available
Urgency:Possible use
Credibility:Confirmed
Severity:Harassment
 
 
Version Summary:Cisco Security Intelligence Operations has detected significant activity on June 2, 2014.
 

Description
 
Cisco Security Intelligence Operations has detected significant activity related to spam email messages that claim to contain a product order quote attachment for the recipient. The text in the email message attempts to convince the recipient to open the attachment and view the details. However, the .zip attachment contains a malicious .scr file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID4400KVR, RuleID4400_1KVR, RuleID4400KVR_2, and RuleID4400_1kvr) may contain any of the following files:

Order Statement2.zip
image.scr
Order.zip
Order_List.zip
New Ans.scr
Purchase Order.zip
New Ans (1).scr
photo.zip
photo.scr
myphoto.zip
myphoto.scr
PO (1).zip
PHOTO.zip
bicini-photos.scr
photos.zip
I.scr
ORDER.zip
PO.zip
New Ans (2).scr
IMG1326943772-JPG.zip
IMG5647330346-JPG.scr
mypic.zip
mypic.scr
Payment Slip.zip
image01.scr
Payment 15.7.zip
image.exe
IMG4961553749-JPG.zip
IMG6602843310-JPG.scr
PO1001.zip
PO1001.exe
IMG4359927104-JPG.zip
IMG3028839956-JPG.scr
IMG.exe
PHOTO12.zip
PHOTO12.scr
PO415.zip
PO415.exe
DC7854152.zip
DC7854152.exe
PO.scr
IMG1919953362-JPG.zip
IMG0743464904-JPG.scr
IMG9052773134-JPG.zip
IMG6855733010-JPG.scr
IMG0827073254-JPG.zip
IMG6936703669-JPG.scr
IMG8749471645-JPG.zip
IMG4859059412-JPG.scr
IMG9986525450-JPG.zip
IMG4273819912-JPG.scr
IMG8854485525-JPG.zip
IMG7807852077-JPG.scr
IMG6440642120-JPG.zip
IMG2239132369-JPG.scr
PO 72.exe
TT copy.exe
PO_0314.zip
PO_0314.exe
NEW PO.zip
NEW PO.exe

PO_10114859021.zip
PO_10114859021.exe

PO748.zip
PO748.exe
PO544 (2).zip
PO544.exe
PO_1403.zip
PO_1403.exe
PO51038.zip
PO51038.exe
soft_crypt_pUH1V532ad88b2a8a7.exe
New_PO.zip
New_PO.exe
PO.exe

PO _ file _ p_d_f_.exe
PO_3810.zip
PO_3810.exe

Product Sample.zip
PO-78283992.zip
PO-78283992.exe

PO831.zip
PO831.exe
P.O.zip
P.O.scr

The image.scr file in the Order Statement2.zip attachment has a file size of 1,298,482 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xA67B601E008A7084C72AECE71AD0A1FC

A variant of the image.scr file attachment has a file size of 1,368,064 bytes. The MD5 checksum is the following string: 0x06A3E972C97754D53F01F83E9962DA2C

A third variant of the image.scr file in the Order_List.zip attachment has a file size of 1,183,744 bytes. The MD5 checksum is the following string: 0xBC66A79D5CDC21202742E1BCE0E9A480

A fourth variant of the image.scr file in the Order.zip attachment has a file size of 1,507,3284 bytes. The MD5 checksum is the following string: 0x5A932D96E7CF46F52D79B1F3F593944A

The New Ans.scr file in the Purchase Order.zip attachment has a file size of 344,576 bytes. The MD5 checksum is the following string: 0x88EFB56406ABCB0E078BFD52423A3FBB

The New Ans (1).scr file in the Purchase Order.zip attachment has a file size of 324,096 bytes. The MD5 checksum is the following string: 0x142FCC973760F66FC410F6B83A6FCCB9

The photo.scr file in the photo.zip attachment has a file size of 97,415 bytes. The MD5 checksum is the following string: 0xE15DB769266AA0EF62B96886304AD358

A variant of the photo.scr file in the photo.zip attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0xCFF3F6DDD6017A008E908A66F5A7D792

The myphoto.scr file in the myphoto.zip attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x9483F1F7ED1D7A46A602FF1ACEBB0186

The PO.exe file in the PO (1).zip attachment has a file size of 806,400 bytes. The MD5 checksum is the following string: 0xC947828A851C322A9C33929180F06DE7

A variant of the PO.exe file has a file size of 616,448 bytes. The MD5 checksum is the following string: 0x5F45BAC0605F222158D9E3FFBF0E47AE

The bicini-photos.scr file in the PHOTO.zip attachment has a file size of 56,722 bytes. The MD5 checksum is the following string: 0x0F565BE4D8A55772F8474341FE22D1FA

The I.scr file in the photos.zip attachment has a file size of 135,476 bytes. The MD5 checksum is the following string: 0x06F635E2B2A0A373C0CDCF93DDDC3E98

A third variant of the PO.EXE file in the ORDER.zip attachment has a file size of 272,896 bytes. The MD5 checksum is the following string: 0x76F2B70D099372B9C63A76A731259B4A

The New Ans (2).scr file in the PO.zip attachment has a file size of 549,376 bytes. The MD5 checksum is the following string: 0x0999C875F627425BD63FCCA8EF0AA5AC

The IMG5647330346-JPG.scr file in the IMG1326943772-JPG.zip attachment has a file size of 740,324 bytes. The MD5 checksum is the following string: 0xDA7685F56A6C462BC3963C6AD2385E4A

The mypic.scr file in the mypic.zip attachment has a file size of 58,368 bytes. The MD5 checksum is the following string: 0x405AF735FDB37DF21569D26273615FF9

The image01.scr file in the Payment Slip.zip attachment has a file size of 539,153 bytes. The MD5 checksum is the following string: 0xAADAEAD0040536E33DDEB458E196C6A0

The image.exe file in the Payment 15.7.zip attachment has a file size of 282,624 bytes. The MD5 checksum is the following string: 0xEC965FA0E751BEC5B61FC736B49590E2

The IMG6602843310-JPG.scr file in the IMG4961553749-JPG.zip attachment has a file size of 431,263 bytes. The MD5 checksum is the following string: 0x5BE5D359A42395A4BDEDCAC32FFDFF1D

The PO1001.exe file in the PO1001.zip attachment has a file size of 320,000 bytes. The MD5 checksum is the following string: 0x76DFD893FEC2675EEEC8EB6D85744B9C

The IMG3028839956-JPG.scr file in the IMG4359927104-JPG.zip attachment has an approximate file size of 3,717 bytes. The MD5 checksum is not available.

The IMG.exe file has a file size of 139,885 bytes. The MD5 checksum is the following string: 0x7F6460C525EB96AB22B7E811235635EF

The PHOTO12.scr file in the PHOTO12.zip attachment has a file size of 293,888 bytes. The MD5 checksum is the following string: 0x1BFCC2B3DC190317B2AE18C95C93E250

The PO415.exe file in the PO415.zip attachment has a file size of 831,488 bytes. The MD5 checksum is the following string: 0x9C1326858CB5C4954ADA38CA9A8629B1

A fourth variant of the PO.exe file in the PO.zip attachment has a file size of 1,524,736 bytes. The MD5 checksum is the following string: 0xCC5F741C781739AD8FCBA258B20B86C2

The DC7854152.exe file in the DC7854152.zip attachment has a file size of 475,660 bytes. The MD5 checksum is the following string: 0x0321939381A56D8161C3CA2D0E539EAE

A fifth variant of the PO.exe file in the PO.zip attachment has a file size of 331,065 bytes. The MD5 checksum is the following string: 0xF44359895F8C2BE4AB0C6BDC64898E7B

The PO.scr file in the PO.zip attachment has a file size of 342,417 bytes. The MD5 checksum is the following string: 0xA474A4044D5C9ED6A3422ABBD1FFB29D

The IMG0743464904-JPG.scr file in the IMG1919953362-JPG.zip attachment has a file size of 22,528 bytes. The MD5 checksum is the following string: 0x48F540528A94F3CA15F4645F11F3FC16

The IMG6855733010-JPG.scr file in the IMG9052773134-JPG.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0xEF08A46E3C75488C227CF0CE75A6F3A2

The IMG6936703669-JPG.scr file in the IMG0827073254-JPG.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0xEF08A46E3C75488C227CF0CE75A6F3A2

The IMG4859059412-JPG.scr file in the IMG8749471645-JPG.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0x330E140FBB23D879DC761B6D2A6338D7

The IMG4273819912-JPG.scr file in the IMG9986525450-JPG.zip attachment has a file size of 22,528 bytes. The MD5 checksum is the following string: 0xFE6BA6F7BEC7BAC800979DB9EED6CF81

The IMG7807852077-JPG.scr file in the IMG8854485525-JPG.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0x58A83203558ECE60EE42BA6AFBA7FC55

The IMG2239132369-JPG.scr file in the IMG6440642120-JPG.zip attachment has a file size of 15,360 bytes. The MD5 checksum is the following string: 0x6E4F01EB88FE4AA47E643C7CBE358FB7

A sixth variant of the PO.exe file in the PO.zip attachment has a file size of 1,157,915 bytes. The MD5 checksum is the following string: 0x734A161B29755A3BDE46F49C1260CF2F

The PO 72.exe file in the PO.zip attachment has a file size of 1,098,752 bytes. The MD5 checksum is the following string: 0x465F7F106B8C72CE1FF710BA0D4C5974

The TT copy.exe file in the PO.zip attachment has a file size of 1,053,495 bytes. The MD5 checksum is the following string: 0x97DEEF067C1FED071644866DA4CE1E03

A variant of the PO.scr file in the PO.zip attachment has a file size of 1,110,885 bytes. The MD5 checksum is the following string: 0x1B49E46034E3D22A689FB0A53D43B2DA


A seventh variant of the PO.exe file in the PO.zip attachment has a file size of 350,009 bytes. The MD5 checksum is the following string: 0xEA7AC9C06C7AE0AA88CCCBCB11C96691

The PO_0314.exe file in the PO_0314.zip attachment has a file size of 822,336 bytes. The MD5 checksum is the following string: 0xDE8424A501D3F719A4762CB6F8DA49CA

An eighth variant of the PO.exe file in the PO.zip attachment has a file size of 742,045 bytes. The MD5 checksum is the following string: 0x830E12BD4B5856E08032A7E55A40A0AD

A ninth variant of PO.exe file in the NEW PO.zip attachment has a file size of 635,911 bytes. The MD5 checksum is the following string: 0x0DCA006FE593A22BDBB9D50791367F32

A variant of the NEW PO.exe file in the NEW PO.zip attachment has a file size of 635,911 bytes. The MD5 checksum is the following string: 0xB0B2965C030023283622A10E86DF80FB

A third variant of the po.scr file in the po.zip attachment has a file size of 289,809 bytes. The MD5 checksum is the following string: 0xD70C7FE12B758778DC7A60F33B04DD6C

The PO_10114859021.exe file in the PO_10114859021.zip attachment has a file size of 1,560,379 bytes. The MD5 checksum is the following string: 0x2631091C887C0D643B65FBA7C41C1FA4

The PO748.exe file in the PO748.zip attachment has a file size of 482,801 bytes. The MD5 checksum is the following string: 0x064236D6F2F4BF375C1AE3A2D1E9E9B2

The westernunion_order_receipt.exe file in the westernunion_order_receipt.zip attachment has a file size of 213,833 bytes. The MD5 checksum is the following string: 0x35A443787C38908972E442F0E78241A8

The PO_1403.exe file in the PO_1403.zip attachment has a file size of 775,744 bytes. The MD5 checksum is the following string: 0xADF4959D0D4C31434EDC5085723B972C

The PO51038.exe file in the PO51038.zip attachment has a file size of 1,550,848 bytes. The MD5 checksum is the following string: 0xB14C48844623330B2035391BD63476A3

The soft_crypt_pUH1V532ad88b2a8a7.exe file in the New PO.zip attachment has a file size of 319,689 bytes. The MD5 checksum is the following string: 0x9C0E33F414298FFFF7062A6C9EE1474A

The New_PO.exe file in the New_PO.zip attachment has a file size of 1,401,135 bytes. The MD5 checksum is the following string: 0x474991EEBB37C64E41038F19169224E9

A third variant of the NEW PO.exe file in the NEW PO.zip attachment has a file size of 707,595 bytes. The MD5 checksum is the following string: 0x5232978F224B0787040A707BE44FD72D

A fourth variant of the NEW PO.exe file in the NEW PO.zip attachment has a file size of 713,739 bytes. The MD5 checksum is the following string: 0x33AF5659549FA1E4C09792D86F8B9EB0

The PO _ file _ p_d_f_.exe file in the PO.zip attachment has a file size of 717,312 bytes. The MD5 checksum is the following string: 0x895914195CBB8317B8D2403A546730CC

A fifth varinat of the NEW PO.exe file in the NEW PO.zip attachment has a file size of 707,083 bytes. The MD5 checksum is the following string: 0xC580FACACB29B8AC3EAAAC5C3CC74BF2

The PO_3810.exe file in the PO_3810.zip attachment has a file size of 1,102,848 bytes. The MD5 checksum is the following string: 0xD54F8C9EF487CB6862A5402E2F988B6E

A tenth variant of the PO.exe file in the Product Sample.zip attachment has a file size of 329,448 bytes. The MD5 checksum is the following string: 0x0D397C2AFC7E583C04517DCAD5B129A4

The PO-78283992.exe file in the PO-78283992.zip attachment has a file size of 365,632 bytes. The MD5 checksum is the following string: 0x57A33392D8BEDECC2DAA0DEF2065DD28

The PO831.exe file in the PO831.zip attachment has a file size of 1,359,360 bytes. The MD5 checksum is the following string:0xF179B023B7B5A5AAD2DACDB0FB1B4F3D

A fourth variant of the po.scr file in the po.zip attachment has a file size of 541,184 bytes. The MD5 checksum is the following string: 0xB03B21FDC1F7E01AEFDE4A2851BA7D06


A 11th variant of the PO.exe file in the ORDER.zip attachment has a file size of 491,520 bytes. The MD5 checksum is the following string: 0x8A6E44A537FEB8DC9B325C5A2857C45E

The P.O.scr file in the P.O.zip attachment has file size of 967,680 bytes. The MD5 checksum is the following string: 0x2EB03993CA5D5F195B68F0F2DDF8EF39

A variant of the P.O.scr file in the P.O.zip attachment has a file size of 967,680 bytes. The MD5 checksum is the following string: 0x1393069E78B2A6379D8E53E5F6FC9529

The following text is a sample of the email message that is associated with this threat outbreak:

Subject: Global Service Inc "New Product Order #638749 "

Message Body:

Hi,
This is the order statement for Mr. Jack Roberts Order.Kindly find the attached file below,the products are certified new
with 2yrs warranty.Pls forward to Mr.Jack for the signing completion.
Regards,
Carson
ASS. GLOBAL TRUST INC.

Or

Subject: Re: Purchase Order

Message Body:

Dear Sir,
Wish we could establish business relationship in this business year 2013.
You produce products we need and we want to make first order for just
a container and if business goes well, our order will increase
subsequently.
Find the attached order and let us have the FOB price. And also what
is your payment terms, do you accept LC for large orders?
Hope you reply soon.
Regards,
Kaiser Amando
Proprietor

Or

Subject: Hello!

Message Body:

Hi
how is your day today?
I want to meet you
here is my photo
kiss

Or

Subject: hi.......

Message Body:

Hi
I am Tat'yana. I am from Ukraine.
I am looking for relation. If you are interesting , answer me.
Sent you my picter. I hope you like it!
I am wait your answer quickly.
Bye

Or

Subject: Order

Message Body:

Hello,
How are you doing? Thanks for your response to our subordinate company. I have gone through your list of products. Please do check the attachment of our purchase order.
Thank you.
Joe Wood

Or

Subject: New Purchase Order

Message Body

Hello,
Did you receive my email yesterday .
Hope this email reach you . We TUNISIE Gr want your company to supply this attached order .
Here is our New PO attached kindly prepare your best price list .
All the information and specifications of our Order are in the PO attached
We await your reply regards to this urgent order and kindly inform us if this will be ready before end of next month.
Many Thanks
Regards
raoudha charfi

Or

Subject: PO form SAMSUNG,UK head office

Message Body:

Dear Supplier
My name is GERRAD HOSMAN,
i am purchasing manager of Samsung, london office uk,branch,
we need your company to supply us some urgent order,
after check with so many companies we decided to work with your company,
please find attachment is our PO for this order,please delivery date is on or before 27 january 2014
please check if it is ok by your company please,sign back,so we can arrange opening of L/C with our bank,
we need this order to be supplied on or before 27 of january,
please check the PO, and inform us,if there is need for any amendment please let me know,
you can contact me directly by email or by my mobile if urgent,
Thanks
B/regards
GERRAD HOSMAN

Or

Subject: New Order

Message Body:

My company is interested with your product we have seen
and would like to place Order from your company.
View the attachment for specification products we want to purchase and
kindly quote me your best product with PI if possible.
We will appreciate your urgent consideration.
look forward to hear back from you.
Best regards!
Ling - Regional Manager
Haiying Enterprise Group Co., LTD
Wuxi Haiying International trade Co.,Ltd.
Tel: +86-510-88669378+86-510-88669378
Fax: +86-510-88669379
Email: icetin@abkaygroup.com
Skype: Ling102
website: hxxp://www.haiyingmedical.com
hxxp: //www.haiying.com

Or
Message Body:

Hello Sir/Ma,
We have made some additional changes in the purchase order sent to you
earlier last week.
Pls go through the added items carefully as contained in our purchase
order attached above and
send us your proforma invoice as we want to receive this order before the
end of next month.
We await your PI asap.
Regards,
Or
Subject: Fwd: New Order

Message Body:

We got a recommendation of you from one of your customers about your products, and we would like to order some products or more depending on the price.
Your FOB Prices and FOB Port of loading.
Your Mode of Payment. ( if by L/C or T/T )
Attached herein is our company introduction and the list of items we wish to order.
I hope we can establish a long business relationship.
Awaiting your confirmation
--
Best Regards.

Or
Subject: Fwd: New order

Message Body:

One of your customers recommended your company to us and we would like to order some products or more depending on the price.
Your FOB Prices and FOB Port of loading.
Your Mode of Payment. ( if by L/C or T/T )
Attached herein is our company introduction and the list of items we wish to order.
I hope we can establish a long business relationship.
Awaiting your confirmation
--
Best Regards.

Or
Message Body:

Dear supplier,
We are buying agents from Malaysia and one of your regular customers recommended your company for reliable services and good quality products.
We are urgently interested in your displayed products on the trade website for our clients.
We are hoping that your company product matches our customer specifications.
Kindly extract the attachment to view our specification in the Sample and Purchase Order (PO51038) so you can get back to us with full details.
Sales & Marketing Dept.

Or
Message Body:

DEAR SIR,
PLEASE QUOTE YOUR BEST PRICE AND AVAILABILITY FOR THE ATTACHED ELECT
ITEMS
Thanks and Regards
Or
Subject: PO#36781 (Purchase Order)

Message Body:

Hello Sir/Madam,
Good day. I am Nisar from Yiwu Shundian Trade Co. We have a major demand from our customer to supplier’s quantity product which is similar to your product service. Find attached is the product specification (PO36781) and quantity required for initial purchase.
Kindly send us quote for product specification attached with your minimum order quantity, FOB and payment terms. Do you accept LC?
Sincerely hope to have good cooperation with you. I wait for your early reply.
Best wishes,
Manager

Or
Message Body:

Hello Dear,
Having go through your website we offer great interest in your product
please find attached New Purchase Order and sample.Kindly arrange to
supply the same products on urgent basis.
Thank you,
Joe Tan

Cisco Security Intelligence Operations analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security Intelligence Operations
Cisco SenderBase Security Network

 
Alert History
 

Version 49, May 28, 2014, 8:53 AM: Cisco Security Intelligence Operations has detected significant activity on May 26, 2014.

Version 48, May 22, 2014, 8:26 AM: Cisco Security Intelligence Operations has detected significant activity on May 20, 2014.

Version 47, May 19, 2014, 8:11 AM: Cisco Security Intelligence Operations has detected significant activity on May 19, 2014.

Version 46, May 16, 2014, 9:16 AM: Cisco Security Intelligence Operations has detected significant activity on May 14, 2014.

Version 45, May 5, 2014, 8:19 AM: Cisco Security Intelligence Operations has detected significant activity on May 4, 2014.

Version 44, April 29, 2014, 7:58 AM: Cisco Security Intelligence Operations has detected significant activity on April 28, 2014.

Version 43, April 18, 2014, 8:52 AM: Cisco Security Intelligence Operations has detected significant activity on April 16, 2014.

Version 42, April 17, 2014, 9:50 AM: Cisco Security Intelligence Operations has detected significant activity on April 16, 2014.

Version 41, April 15, 2014, 8:51 AM: Cisco Security Intelligence Operations has detected significant activity on April 14, 2014.

Version 40, April 10, 2014, 9:30 AM: Cisco Security Intelligence Operations has detected significant activity on April 9, 2014.

Version 39, April 9, 2014, 8:23 AM: Cisco Security Intelligence Operations has detected significant activity on April 7, 2014.

Version 38, March 24, 2014, 9:23 AM: Cisco Security Intelligence Operations has detected significant activity on March 21, 2014.

Version 37, March 21, 2014, 8:27 AM: Cisco Security Intelligence Operations has detected significant activity on March 20, 2014.

Version 36, March 17, 2014, 7:59 AM: Cisco Security Intelligence Operations has detected significant activity on March 15, 2014.

Version 35, March 14, 2014, 9:59 AM: Cisco Security Intelligence Operations has detected significant activity on March 13, 2014.

Version 34, March 13, 2014, 10:21 AM: Cisco Security Intelligence Operations has detected significant activity on March 11, 2014.

Version 33, March 11, 2014, 8:49 AM: Cisco Security Intelligence Operations has detected significant activity on March 10, 2014.

Version 32, March 4, 2014, 7:46 AM: Cisco Security Intelligence Operations has detected significant activity on March 3, 2014.

Version 31, February 28, 2014, 7:33 AM: Cisco Security Intelligence Operations has detected significant activity on February 27, 2014.

Version 30, February 27, 2014, 8:02 AM: Cisco Security Intelligence Operations has detected significant activity on February 26, 2014.

Version 29, February 26, 2014, 8:37 AM: Cisco Security Intelligence Operations has detected significant activity on February 25, 2014.

Version 28, February 6, 2014, 8:38 AM: Cisco Security Intelligence Operations has detected significant activity on February 5, 2014.

Version 27, January 31, 2014, 9:07 AM: Cisco Security Intelligence Operations has detected significant activity on January 29, 2014.

Version 26, January 29, 2014, 8:50 AM: Cisco Security Intelligence Operations has detected significant activity on January 27, 2014.

Version 25, January 23, 2014, 7:17 AM: Cisco Security Intelligence Operations has detected significant activity on January 22, 2014.

Version 24, December 24, 2013, 12:04 PM: Cisco Security Intelligence Operations has detected significant activity on December 24, 2013.

Version 23, December 20, 2013, 8:18 AM: Cisco Security Intelligence Operations has detected significant activity on December 19, 2013.

Version 22, December 9, 2013, 10:25 AM: Cisco Security Intelligence Operations has detected significant activity on December 6, 2013.

Version 21, November 18, 2013, 8:47 PM: Cisco Security Intelligence Operations has detected significant activity on November 15, 2013.

Version 20, October 16, 2013, 2:20 PM: Cisco Security Intelligence Operations has detected significant activity on October 16, 2013.

Version 19, September 30, 2013, 5:55 PM: Cisco Security Intelligence Operations has detected significant activity on September 30, 2013.

Version 18, July 17, 2013, 2:37 PM: Cisco Security Intelligence Operations has detected significant activity on July 16, 2013.

Version 17, July 10, 2013, 2:33 PM: Cisco Security Intelligence Operations has detected significant activity on July 9, 2013.

Version 16, July 9, 2013, 1:39 PM: Cisco Security Intelligence Operations has detected significant activity on July 9, 2013.

Version 15, July 8, 2013, 12:37 PM: Cisco Security Intelligence Operations has detected significant activity on July 6, 2013.

Version 14, July 5, 2013, 1:41 PM: Cisco Security Intelligence Operations has detected significant activity on July 4, 2013.

Version 13, June 17, 2013, 6:46 PM: Cisco Security Intelligence Operations has detected significant activity on June 15, 2013.

Version 12, June 4, 2013, 2:30 PM: Cisco Security Intelligence Operations has detected significant activity on June 3, 2013.

Version 11, June 3, 2013, 8:05 PM: Cisco Security Intelligence Operations has detected significant activity on June 3, 2013.

Version 10, May 24, 2013, 7:26 PM: Cisco Security Intelligence Operations has detected significant activity on May 23, 2013.

Version 9, May 22, 2013, 3:17 PM: Cisco Security Intelligence Operations has detected significant activity on May 21, 2013.

Version 8, May 20, 2013, 4:18 PM: Cisco Security Intelligence Operations has detected significant activity on May 20, 2013.

Version 7, March 26, 2013, 4:01 PM: Cisco Security Intelligence Operations has detected significant activity on March 26, 2013.

Version 6, March 25, 2013, 7:13 AM: Cisco Security Intelligence Operations has detected significant activity on March 24, 2013.

Version 5, March 12, 2013, 12:45 PM: Cisco Security Intelligence Operations has detected significant activity on March 12, 2013.

Version 4, February 25, 2013, 7:06 AM: Cisco Security Intelligence Operations has detected significant activity on February 24, 2013.

Version 3, January 3, 2013, 6:15 AM: Cisco Security Intelligence Operations has detected significant activity on January 2, 2013.

Version 2, January 2, 2013, 6:31 AM: Cisco Security Intelligence Operations has detected significant activity on December 22, 2012.

Version 1, December 13, 2012, 6:21 AM: Cisco Security Intelligence Operations has detected significant activity on December 12, 2012.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldThreat Outbreak Alert Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield