Threat Outbreak Alert: Fake Shipping Charges Notification Email Messages on May 20, 2014

2014-05-20T16:05:49
ID CISCO-THREAT-34305
Type ciscothreats
Reporter Cisco
Modified 2014-05-20T16:05:49

Description

Medium

Alert ID:

34305

First Published:

2014 May 20 16:05 GMT

Version:

1

Summary

  • Cisco Security has detected significant activity related to spam email messages that claim to contain a shipping charges notification from UPS for the recipient. The text in the email message attempts to convince the recipient to open the attachment to view the details. However, the .zip attachment contains a malicious .scr file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID10058) may contain the following files:

> Ref_5348942.zip
Ref_2005214.scr

The Ref_2005214.scr file in the Ref_5348942.zip attachment has a file size of 16,896 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xCD1F364E46C6367DD96F8469EB226981

The following text is a sample of the email message that is associated with this threat outbreak:

> Subject: UPS - Credit Card Billing Adjustment. Ref# 5348942

Message Body:

**UPS Customer:
The attached file details adjustments that have been made to shipping charges originally billed to your credit card. These adjustments are for charges or credits that have occurred after the initial processing of your shipment(s). These adjustments have been applied to your credit card and will appear on your next credit card statement.
All shipments are subject to the terms and conditions contained in the UPS Tariff and the UPS Terms and Conditions of Service, which can be found at www.ups.com
If you have questions regarding these adjustments please contact the UPS Billing Department. We can be reached at 1-800-811-1648, or you may reply to this e-mail directly. Please allow one business day for e-mail inquiries.
Please note: the attached file is in PDF format. If you are unable to open the attached file, please download the free Adobe Acrobat Reader by entering the following address in your web browser: http://www.adobe.com/products/acrobat/readstep.html


This communication contains proprietary information and may be confidential. If you are not the intended recipient of this e-mail, you are hereby notified that any dissemination, distribution or copying of this message is strictly prohibited. If you received this message in error, please delete it immediately.**

Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network

Revision History

  • Version | Description | Section | Date
    ---|---|---|---
    1 | Initial Release | | 2014-May-20 16:05 GMT
    Show Less

Legal Disclaimer

  • THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products