Ellis Willis<\/strong><\/p>\n25 July 2021: form_19927-267.zip (85 kb): Extracts to billing_form91_4352-2105.pdf.scr Current Virus total detections: 5\/53 MALWR Auto Analysis:<\/p>\n
This Help & Advice \u2013 Virgin Media Business Virgin Media Automated Billing Reminder is another one of the spoofed icon files that unless you have \u201cshow known file extensions enabled\u201c, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected.<\/p>\n
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day.<\/p>\n
Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n","protected":false},"excerpt":{"rendered":"
Help & Advice \u2013 Virgin Media Business Virgin Media Automated Billing Reminder pretending to come from Virginmedia Business <services@virginmediabusiness.co.uk>is another one from the current zbot runs which try to drop cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the…<\/p>\n","protected":false},"author":8,"featured_media":13410,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"default","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/Fake.jpg",1000,666,false],"author_info":{"display_name":"Darrel Heers","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/darrel-heers\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/11451"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=11451"}],"version-history":[{"count":1,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/11451\/revisions"}],"predecessor-version":[{"id":28511,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/11451\/revisions\/28511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13410"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=11451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}