2016 March 30 19:21 GMT
Email messages that are related to this threat (RuleID21996) may contain the following files:
Name | Size in Bytes | MD5 Checksum
Arizona Public Services (APS)Due_INV(43258507).doc
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: Lecia, This is the Invoice for Arizona Public Services (APS) - QB Ref.: 01950460
USE CAUTION - EXTERNAL SENDER: (firstname.lastname@example.org)
Do not click on links or open attachments that are not expected.
For questions or concerns, please email the APS Information Systems Security team at ISS@apsc.com
or contact the APS Helpdesk.
This is an important communication for the Accounting Systems Leader at Arizona Public Services (APS). If you are not them, please disregard and erase it.
Dear Lecia Bowers,
This is just a friendly reminder that your account with us appears as overdue. Our records show that you have a total due balance of $1,829.00. We would greatly appreciate it if you could have this payment sent at your earliest. Please find the QuickBooks Payments invoice no. 000-24576457 attached.
Thank you for your continued business.
Bank of St. Francisville | Accounting and Billing Team
1 Maritime Plz,Suite 2100,San Francisco,California,94111
Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products