{"id":10515,"date":"2022-03-01T00:36:49","date_gmt":"2022-03-01T00:36:49","guid":{"rendered":"https:\/\/nftsgary.com\/?p=688"},"modified":"2022-03-01T00:36:49","modified_gmt":"2022-03-01T00:36:49","slug":"facebook-account-suspended-fake-pdf-malware","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/facebook-account-suspended-fake-pdf-malware\/","title":{"rendered":"Facebook Account Suspended \u2013 Fake PDF Malware"},"content":{"rendered":"
Facebook Account Suspended pretending to come from Facebook <noreply@mail.fb.com> is another one from the current bot runs which try to download various Trojans and password stealers especially banking credential stealers, which may include cridex, dridex, dyreza and various Zbots, cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and follow the link and run the downloaded file .<\/p>\n
A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n
Almost all of these also have a password stealing component, with the aim of stealing your bank, PayPal or other financial details along with your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your Facebook and other social network log in details.<\/p>\n
All the alleged senders, companies, names of employees and phone numbers mentioned in the emails are all innocent and are just picked at random. Some of these companies will exist and some won\u2019t. Don\u2019t try to respond by phone or email, all you will do is end up with an innocent person or company who have had their details spoofed and picked at random from a long list that the bad guys have previously found.<\/p>\n
The bad guys choose companies, Government departments and organisations with subjects that are designed to entice you or alarm you into blindly opening the attachment or clicking the link in the email to see what is happening.<\/p>\n
This malicious email has a link to the goo.gl url shortener service, so hopefully google will quickly deactivate it ( they normally are quite quick at responding to malware being delivered this way )<\/p>\n
Update 15.50 2 February 2021:<\/strong> Google seem to be ignoring the report to take down this url so far today or are far too busy complaining about Microsoft and other program makers not issuing patches inside the 90 day time period that Google insist on, to do something really useful in actually protecting users from malware like this one. The offending Google short URL<\/a> is which redirects to [do not click ] ( a compromised site<\/a>) These sort of reports should be acted on inside 90 seconds not 90 days<\/p>\n Update 3 February 2021:<\/strong> today\u2019s version comes from [do not click ] which downloads [do not click ] which has a VirusTotal detection<\/a> rate of 26\/57 <\/strong>and looks like one of the current bunch of ransomware\/cryptowall\/ cryptolocker ransom maware trojans which lock all your data and ask for a ransom to be paid to return it to you<\/p>\n Please read our How to protect yourselves page<\/a> for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\n The email looks like:<\/p>\n <\/p>\n Thanks, The Facebook Team<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n Linux master 3.2.6-gentoo #2 SMP Wed Jul 18 18:04:28 EEST 2012 i686 Intel(R) Xeon(TM) CPU 3.00GHz GenuineIntel GNU\/Linux<\/p><\/blockquote>\n\n\n
\n \n \n\n
\n facebook<\/strong><\/td>\n<\/tr>\n \n \n \n\n
\n Account Temporarily Disabled<\/strong><\/p>\n \n\n
\n \n \n\n
\n Your account is currently unavailable due to our Terms and Policies renewal To enable your account please click bellow and read the new Policies TermsTerms & Policies<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n \n\n
\n Facebook, Inc. P.O. Box 10005, Palo Alto, CA 94303<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
\n2 February 2021: TermsPolicies.pdf.exe Current Virus total detections: 11\/57
\nThis is another one of the spoofed icon files that unless you have \u201cshow known file extensions enabled<\/a>\u201c, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.<\/p>\n