2015 November 18 21:45 GMT
Email messages that are related to this threat (RuleID19513) may contain the following files:
Name | Size in Bytes | MD5 Checksum
| Not Available
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: Payment Advice - Advice Ref:[G70817814156] / ACH credits / Customer Ref:[TFS07072014144425] / Second Party Ref:[0000164918BND]
The attached payment advice is issued at the request of our customer. The advice is for your reference only.
Global Payments and Cash Management
This is an auto-generated email, please DO NOT REPLY. Any replies to this
email will be disregarded.
Notice: This e-mail message, together with any attachments, contains
information of Merck & Co., Inc. (2000 Galloping Hill Road, Kenilworth,
New Jersey, USA 07033), and/or its affiliates Direct contact information
for affiliates is available at
hxxp: //www.merck.com/contact/contacts.html) that may be confidential,
proprietary copyrighted and/or legally privileged. It is intended solely
for the use of the individual or entity named on this message. If you are
not the intended recipient, and have received this message in error,
please notify us immediately by reply e-mail and then delete it from
Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products