Malicious Thanksgiving Day eCards are now distributing the Emotet Trojan and other malware.
Discovered by BleepingComputer, a new malicious email campaign, attached with a malicious Word document disguising itself as a Thanksgiving Day Greeting Card, has been unearthed.
The email appears to be sent from someone sending the greeting card and wishing the victim a nice holiday.
If a user opens the malicious document, they are instructed to “Enable Content” or “Enable Editing” to which if clicked, the obfuscated macros within the document will execute and install malware onto the victim’s computer.
Once the malware is launched, it will perform multiple tasks such as stealing stored passwords, downloading further malware, and even providing a backdoor to other threat actors, or in the case of Emotet, installing ransomware.
Another spam campaign, discovered by Cryptolaemus, distributes fake work-related or finance-related emails. The email template tells the user that they are closed during the holiday period, creating a sense of urgency which encourages immediate opening of the malicious document. Like the previous campaign mentioned, once the attachment is opened, the Emotet Trojan is downloaded and launched.
Users are urged to refrain from opening attachments from unknown senders. In addition, if a document asks you to Enable Content or Enable Editing – there should be a cause of concern, especially if the document is not from a legitimate email.
The post #Privacy: Thanksgiving eCards found spreading malware appeared first on PrivSec Report.