Please DocuSign this document: Contract_changes_08_27_2014.pdf pretending to come from AT&T via DocuSign <email@example.com> is another one from the current zbot runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your facebook and other social network log in details.
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
Email looks like :
Please review and sign your document
From: AT&T (firstname.lastname@example.org)
AT&T Contract Changes has sent you a new DocuSign document to view and sign. Please click on the ‘View Documents’ link below to begin signing.
Alternately, you can access these documents by visiting docusign.com, clicking the ‘Access Document’ link, and using this security code:
This message was sent to you by AT&T who is using the DocuSign Electronic Signature Service. If you would rather not receive email from this sender you may contact the sender with your request.
If you need assistance, please contact DocuSign Support (email@example.com)
The Global Standard For Digital Transaction Management
Following the link in the email gets you to this page, where clicking on any of the 4 the buttons gives you today’s malware which is the same malware as in today’s version of ADP Past Due Invoice fake PDF malware. For some reason IE11 in Windows 8.1 won’t click the links in the page. They just sit there, but they do open in Chrome & Firefox, so it looks like a case where we are thankful for IE “features” that don’t work as intended, because it protects you from this one
27 August 2014: Contract_changes_08_27_2014.zip (17 kb) : Extracts to Contract_changes_08_27_2014.exe Current Virus total detections:9/55 MALWR Auto Analysis:
This Please DocuSign this document: Contract_changes_08_27_2014.pdf is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.