FedEx Shipment delivery problem – JS malware
An email with the subject of Shipment delivery problem #0000702101 [ random numbered] pretending to come from FedEx International Next Flight with a zip attachment is another one from the current bot runs which try to download various Trojans and password stealers especially banking credential stealers, which may include cridex, dridex, dyreza and various Zbots, cryptolocker, ransomware and loads of other malware on your computer. They use email addresses and subjects that will entice a user to read the email and open the attachment. Net Protector recommend all the customers, do not click on any malicious attachment please Ignor such a fake emails.
The content of the email says :
Dear Customer,
We could not deliver your parcel. You can review complete details of your order in the find attached.
Regards,
John Cantrell, Sr. Operation Agent.
Dear Customer,
This is to confirm that one or more of your parcels has been shipped. Shipment Label is attached to email.
Regards,
Mitchell Bart, Sr. Station Agent.
Dear Customer,
Courier was unable to deliver the parcel to you. Shipment Label is attached to email.
Thanks and best regards,
Glen Gill, FedEx Station Manager.
Other subjects in this set of malicious malspam include:
Problem with parcel shipping, ID:00000953180
Problems with item delivery, n.0000823595
Unable to deliver your item, #00724372
Other senders pretend to be:
FedEx Standard Overnight
FedEx International MailService
FedEx Ground
FedEx 2Day A.M
These malicious attachments normally have a password stealing component, with the aim of stealing your bank, PayPal or other financial details along with your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your Facebook and other social network log in details.
All the alleged senders, companies, names of employees and phone numbers mentioned in the emails are all innocent and are just picked at random. All the shipping, parcel, delivery numbers etc.are random but the number generally matches the attachment number. Some of these companies will exist and some won’t. Don’t try to respond by phone or email.
Attachment consist: Label_00000468516.zip: Extracts to: Label_00000468516.doc.js which download this malicious file 87761567.exe
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)