Change in percent pretending to come from [email protected] is another one from the current zbot runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment.

A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. The email addresses are either faked or belong to users with infected computers or servers, that various bots have compromised. Since posting this, I have received several other copies of the malware email from different senders and all with different names and phone numbers in the body. That makes it harder to filter them out.

This is once again a genuine word doc with an embedded macro that acts as a downloader to download a full blown zbot from http://bernisuperfilm.ru/uupdate2.exe which has a current virus total detection rate of 3/54

If you still use an older version of Microsoft Word, then you are at risk of being infected by this. Modern versions, that is Office 2010 and Office 2013 have macros disabled by default and are set to display in read only mode by default. That stops any macros or embedded programs from running.

Do not open word docs received in an email without scanning them with your antivirus first and be aware that there are a lot of dodgy word docs spreading that WILL infect you with no action from you, if you use an out dated or vulnerable version of word. This is a good reason to update your office programs to a recent version and stop using office 2003 and 2007. The risks in using older version are starting to outweigh the convenience, benefits and cost of keeping an old version going.

I strongly urge you to update your office software to the latest version and stop putting yourself at risk, using old out of date software

Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your facebook and other social network log in details.

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

Hi, [email protected].
Yield reduced. We ask you for information to the attached document to pass to your superiors.
Riojas Imelda
Tel./Fax.: +44 171 6825484

An alternative version of this email reads

Hello, Interest at the rate in the next month will be changed. The information is contained in the attached document. Landolf Lorna Tel./Fax.: +44 171 2630020

6 August 2014: Information.zip : Extracts to Information.doc Current Virus total detections: 2/44 MALWR Auto Analysis:

This Change in percent is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day.

Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.