{"id":11776,"date":"2022-04-12T05:31:15","date_gmt":"2022-04-12T05:31:15","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?p=11776"},"modified":"2023-04-05T08:52:03","modified_gmt":"2023-04-05T08:52:03","slug":"random-invoice-or-bill-word-doc-macro-leads-to-unknown-malware","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/random-invoice-or-bill-word-doc-macro-leads-to-unknown-malware\/","title":{"rendered":"Random Invoice Or Bill \u2013 Word Doc Macro Leads To Unknown Malware"},"content":{"rendered":"

An email with random invoice or bill subjects coming from random names and emails addresses with a malicious word doc attachment is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt.<\/p>\n

They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

A high proportion of these are not getting caught by the spam or content filters because they pass SPF & DKIM authentication checks<\/p>\n

These have a load of different subjects that include:<\/p>\n