2013 July 16 17:42 GMT
2013 August 27 13:05 GMT
Email messages that are related to this threat (RuleID6601 and RuleID6601KVR) may contain the following files:
The ATO_TAX_16072013.exe file in the ATO_TAX_16072013.zip attachment has a file size of 117,248 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xECDD609C484E4B0C13E8D70C16BCF036
The TAX_08222013.exe file in the TAX_mpd.zip attachment has a file size of 119,296 bytes. The MD5 checksum is the following string: 0x6C092550097A118B80295FFE68135CEC
The TAX_08272013.exe file in the TAX_08272013.zip attachment has a file size of 22,528 bytes. The MD5 checksum is the following string: 0x6EFD96B8A7101B22B379A3FE5FD890FE
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: Australian Taxation Office - Refund Notification
Australian Taxation Office
TAX REFUND NOTIFICATION
After the last calculation of your fiscal activity we have determined that you are eligible to receive a refund of 5402.27 AUD.
For more details please follow the steps bellow :
- Right-click the link on the attachment name, and select Save Link As, Save Target As or a similar option provided.
- Select the location into which you want to download the file and choose Save.
- Open the file Microsoft Word file to view the details.
Tax Refund Department
Australian Taxation Office
> Subject: You have received new messages from HMRC
Please be advised that one or more Tax Notices (P6, P6B) have been issued.
For the latest information on your Tax Notices (P6, P6B) please open attached report.
Please do not reply to this e-mail.
The original of this email was scanned for viruses by the Government Secure Intranet virus scanning service supplied by Vodafone in partnership with Symantec. (CCTM Certificate Number 2009/09/0052.) On leaving the GSi this email was certified virus free.
Communications via the GSi may be automatically logged, monitored and/or recorded for legal purposes.
1.This e-mail and any files or documents transmitted with it are confidential and intended solely for the use of the intended recipient. Unauthorised use, disclosure or copying is strictly prohibited and may be unlawful. If you have received this e-mail in error, please notify the sender at the above address and then delete the e-mail from your system. 2. If you suspect that this e-mail may have been intercepted or amended, please notify the sender. 3. Any opinions expressed in this e-mail are those of the individual sender and not necessarily those of QualitySolicitors Punch Robson. 4. Please note that this e-mail and any attachments have been created in the knowledge that internet e-mail is not a 100% secure communications medium. It is your responsibility to ensure that they are actually virus free. No responsibility is accepted by QualitySolicitors Punch Robson for any loss or damage arising from the receipt of this e-mail or its contents. QualitySolicitors Punch Robson:
> Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.
Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.
| | 2013-August-22 14:14 GMT
1 | Cisco Security has detected significant activity on July 15, 2013. | | 2013-July-16 17:42 GMT
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products