Delivery failure , July 28, 2014 BN_3647007 pretending to come from UKmail Express is another one from the current zbot runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your facebook and other social network log in details.
Updated 7 August 2021: A new spam run of this email today. Subject is Delivery failure: PKG-7466428 ( random package number name) pretending to come from UKMail Group <firstname.lastname@example.org>.There are 3 distinctly different malwares attached to the mail and it is random which version you get. All 3 versions however attempt to download the same malware file from a list of infected/compromised servers
All are randomly numbered zips like PKG-7466428.zip there are 3 sizes of zip
39 kb extracts to PKG-002199003.exe ( may be a random numbered .exe) Virus total detections 3/54
41kb extracts to Package details.exe Virus total detections 2/54
68 kb extracts to Parcel details.exe Virus total detections 2/54
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
An urgent service package has come to the local post office. Delivery was rescheduled because our courier was not able to deliver the package [RECEIVER NOT PRESENT].
You can find more information including contact details regarding your package in the attached file.
Copyright © 2014 UKMail Group plc
28 July 2014: BN_2118176.zip (83 kb) : Extracts to report_form2_28-07-2014.pdf.scr Current Virus total detections: 2/54
28 July 2014: BN_6327150.zip(82 kb) : Extracts to report_form2_28-07-2014.pdf.exe Current Virus total detections: 6/54
This Delivery failure , July 28, 2014 BN_3647007 is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.