Researchers from Sophos have intercepted a currently circulating malware campaign, enticing users into downloading and executing malicious file attachments.
The campaign attempts to trick users into thinking that they have received an email from a Xerox WorkCentre Pro photocopier, and has the following filenames attached to it Xerox_Document_08.23_C11125.zip; Xerox_Scan_08.23_K1274.zip.
Please open the attached document. It was scanned and sent to you using a Xerox WorkCentre Pro.Sent by: GuestNumber of Images: 1Attachment File Type: ZIP [DOC]WorkCentre Pro Location: machine location not setDevice Name: [random]
- Spamvertised Uniform traffic tickets and invoices lead to malware
- Spamvertised United Parcel Service notifications lead to malware
- Spamvertised United Parcel Service emails lead to scareware
- Federal Reserve themed emails lead to ZeuS crimeware
- ‘McDonald’s Free Dinner Day’ emails lead to scareware
- Spamvertised bank statements serving scareware
- Spamvertised Post Office Express Mail (USPS) emails lead to malware
- Spamvertised “Reqest Rejected” campaign leads to scareware
- Spamvertised ‘Facebook. Your password has been changed!’ emails lead to malware
Users are advised not to interact with suspicious emails, or spam emails in general.