Jan 092014
 

PG&E Energy Statement. The email pretending to come from an energy company, Pacific Gas and Electric Company  saying  PG&E Energy Statement  is another one from the current asprox botnet runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. Apart from the fact that the recipient of this email is in UK, so wouldn’t be using a US based energy company, this is a very well crafted email with believable links that could fool almost anyone, suddenly panicking with a $500 energy bill when they expected a lot lower one.  The malware in this PG&E Energy Statement is very similar to the recent Costco malware emails when the country, city or area is included in the email.

PG&E ENERGY STATEMENT
Your Account SummaryAmount Due on Previous Statement
Payment(s) Recieved Since Last StatementPrevious Unpaid Balance

Current Electric Charges
Current Gas Charges

$344.70
0.0$344.70

$165.80
49.20

To view your most   recent bill, please click here. You must log-in to your account or register for an online   account to view your statement.
Total Amount Due   BY 02/01/2014 $559.7

Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your facebook and other social network log in details.

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

PG&E Statement   fake email

 

 

 

 

 

9 January 2014: Attachment zip name: PGE_FullStatement_London.zip  Extracted file name:   PGE_FullStatement_London.exe   Current Virus total detections: 7/48 

Updated version 11 January 2014:  PGE_FullStatement_Gillingham.exe    Current Virus total detections:5/42 

This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper word.doc file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

RoboForm: Learn more...

  4 Responses to “PG&E Energy Statement – fake Word doc malware”

Comments (2) Pingbacks (2)
  1.  

    I have been receiving these messages in my Spam folder for several weeks. I have tried, unsuccessfully, to find a spoof service for PG&E so that I could forward the message to them (similar to the ones that all banks have). Maybe PG&E should get on board and try to find the source and stop these messages.

  2.  

    http://www.pgecurrents.com/2014/01/08/pge-warns-of-scam-emails-calls/

    they are aware and looking into it. i successfully forwarded one email to the address listed, but now that email bounces back to me. odd…

 Leave a Reply

(required)

(required)

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

%d bloggers like this: