{"id":11898,"date":"2022-03-24T10:40:46","date_gmt":"2022-03-24T10:40:46","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?p=11898"},"modified":"2023-04-05T13:18:32","modified_gmt":"2023-04-05T13:18:32","slug":"spoofed-microsoft-security-office-urgent-info-regarding-your-bank-assets-delivers-unknown-malware","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/spoofed-microsoft-security-office-urgent-info-regarding-your-bank-assets-delivers-unknown-malware\/","title":{"rendered":"Spoofed Microsoft Security Office \u2013 Urgent Info Regarding Your Bank Assets Delivers Unknown Malware"},"content":{"rendered":"

An email spoofing Microsoft Security Office with the subject of Urgent Info Regarding Your Bank Assets pretending to come from Benedict Brown <chriswigannewton@vkharkov.ru> with a link to a malicious word doc delivers an unknown malware<\/p>\n

Update<\/strong>: In the original set of emails the from: was Benedict Brown <random email address>. Second batch were Microsoft Security Office < random email address> Subsequent batches have both Benedict Brown and Microsoft Security Office in subject line.<\/p>\n

From: Microsoft Security Office <admin@ponyrider.com>
\nFrom: Benedict Brown \/ Microsoft Security Office <nacho@szczecin.eu>
\nFrom: Benedict Brown, Microsoft Security Office <sandrab@veco.ru><\/p>\n

They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

Some subjects seen so far in this malspam run include:<\/p>\n