This set of emails contains exactly the same malware as today’s  version of THIS . Of course it is a fake email and is not a Statement of account from It  is another one from the current zbot runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.

Updated 25 July 2014: another run of these malware laden spoofed emails today. Only difference from earlier versions is the date and they are asking for either May or June payments

Please find attached the statement of account.
We look forward to receiving payment for the December invoice as this is now due for payment.

Update 3 April 2014: we still continue to get these Fake Statement of account emails with malware attachments

Good morning,

Please find attached the statement of account.

We look forward to receiving payment for the March invoice as this is now due for payment.



This email, including attachments, is private and confidential. If you have received this email in error please notify the sender and delete it from your system. Emails are not secure and may contain viruses. No liability can be accepted for viruses that might be transferred by this email or any attachment.

Wilson McKendrick LLP Solicitors, Queens House, 29 St. Vincent Place, Glasgow G1 2DT Registered in Scotland No. SO303162. Members: Mark Wilson LLB Dip. NP LP

Allan T. McKendrick LLB Dip. LP NP.

Almost all of these have a password stealing component, with the aim of stealing your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your facebook and other social network log in details.

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

sky statement of account fake email







8 January 2014 | Extracted file name: Dec-Statement.exe |   Current Virus total detections: 0/58 |   MALWR Auto Analysis:

13 March 2014  Attachment zip | Extracts to Statement.scr |   Current Virus total detections: 2/50|

3 April 2014  Attachment zip (6kb) | Extracts to MarchStatement.scr |   Current Virus total detections: 1/51

This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

Leave a Reply

1 Comment on " Statement of account – fake PDF malware"

Notify of

Sort by:   newest | oldest | most voted

[…] mentioned in other sources (1, 2, 3), the scenario is always similar. A victim is sent an email with an attachment. In the subject of […]