2016 January 12 21:07 GMT
2016 January 15 13:24 GMT
Email messages that are related to this threat (RuleID20404 and RuleID20404KVR) may contain the following files:
Name | Size in Bytes | MD5 Checksum
Invoice No 39830 AC LA 3F215C63.doc | 46,336
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: Kaseya Invoice - B793EC28
Dear Accounts Payable,
Thank you for your purchase of Kaseya Licenses. Attached please find our invoice for your purchase under the K2 Software Catalog.
Our bank details for wire transfer are included on the attached invoice.
Should you wish to submit payment via credit card, please contact our customer service department for assistance with adding card details through our portal.
Please do not hesitate to let us know if you have any questions.
Thanks again for your patronage.
> Subject: REPORT SPAM
Please ensure that you keep us informed of any changes
in your Bank Account details as you may need to set up a new Direct Debit mandate.
If you no longer wish to continue payment via Direct Debit
after the minimum term of 12 months has elapsed then Payments
can also be made via our website www.chevronalarms.com,
click on payments tab and choose to make a payment via PayPal.
Please quote the Invoice number 39830 and your Account Number LA MOT01.
Alternatively you can call the office on 01784 438822 and pay directly by Debit or Credit Card.
Please note that we make no additional charge for payment by Visa or MasterCard Credit or Debit cards,
however there will be a 4% handling charge if payment is made via American Express.
Bank Payments may also be made to HSBC Bank PLC - Egham Branch
Sort Code 40-20-34
Please quote reference 39830
Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products