Important – Internal Only – Fake PDF Malware


Important – Internal Only that pretends to come from administrator @ your domain is another one from the current zbot runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.

Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your facebook and other social network log in details.

This one not only pretends to come from administrator @ your domain but also names the zip file according to your email domain so in 1 case that I received the email was addressed to It pretends to come from Administrator <> and the zip file attached to it is named Internal Only – This means that every sender will be different for every recipient and every attachment will be a different file name. When unzipped all the files have the same name Internal Only.scr

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

File Validity: 07/14/2021

Company :

File Format: Office – Excel ,PDF

Name: Internal Only

Legal Copyright: © Microsoft Corporation. All rights reserved.

Original Filename: Internal Only.pdf

********** Confidentiality Notice **********.

This e-mail and any file(s) transmitted with it, is intended for the exclusive use by the person(s) mentioned above as recipient(s).

This e-mail may contain confidential information and/or information protected by intellectual property rights or other rights. If you

are not the intended recipient of this e-mail, you are hereby notified that any dissemination, distribution, copying, or action taken

in relation to the contents of and attachments to this e-mail is strictly prohibited and may be unlawful. If you have received this

e-mail in error, please notify the sender and delete the original and any copies of this e-mail and any printouts immediately from

your system and destroy all copies of it.

14 July 2021: Internal Only – Extracted file name: Internal Only.scr Current Virus total detections: 3/54

This Important – Internal Only is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day.

Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

Leave a Reply

Your email address will not be published.

Related Posts