Medium
Alert ID:
53004
First Published:
2017 March 13 13:45 GMT
Version:
1
Summary
Email messages that are related to this threat (RuleID28255) may contain the following files:
Name | Size in Bytes | MD5 Checksum |
---|---|---|
crew particulars.zip / crew particulars.pif | ||
924,598 | ||
0xD66DA6BE8915F6376CE2F5479064328F |
The following text is a sample of the email message that is associated with this threat outbreak:
> Subject: RE: MV " TBN " - CREW EXCHANGE
Message Body:
RE: MV " TBN " - CREW EXCHANGE
Dear Madam or Sir, good day!
We are the crew manager of the above mentioned vessel and kindly ask you to assist us in arranging a crew exchange when M/V
" TBN " is calling your good port ETA. 21.03.2017.
Copy of joiners Passport, Seamanโs Book, visa copy and contact details with Respective personal data and flight details are
as attached:
Please assist with immigration, transportation and reasonable accommodation if required.
Kindly apply for Exit Visa for the Off-signer.
Kindly arrange for visa upon arrival / OK TO BOARD (where applicable) and revert with copy of same at your earliest
convenience.
We will await your confirmation that all is in order & thank you in advance for your assistance.
MANNING OFFICE,
We will appreciate if you can send us latest copy of the DCL of all joiners for our perusal and confirm readiness to join
as per scheduled crew change.
Kindly note that all original documents MUST be onhand prior crew dispatched.
Yours faithfully,
IMPORTANT INFORMATION
We only accept invoices and disbursements in PDF format by email to [email protected]
Please address all crew related invoices and disbursements as follows:
ISO 9001:2008
MLC, 2006 Compliance*
Cisco security appliances can help protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Cisco Web Security Appliances help secure and control web and email traffic by offering layers of malware protection. Cisco security appliances are automatically updated to help prevent both spam email and hostile web URLs from being passed to the end user.
Revision History
* Version | Description | Section | Date |
---|---|---|---|
1 | Initial release to report significant activity detected by Cisco Security on March 13, 2017. | โ | 2017-March-13 |
Show Less |
Legal Disclaimer
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products