Previous  bell    Next
bell Warning: JavaScript is turned off! Some features on this website will not work without it.

Westminster Hotel Virus Email - Your Reservation is Now Confirmed July 2013

If you receive the malicious email message below, appearing as if it came from the Westminster Hotel, please do not open the attachment. The attachment is a malicious program or malware called a Trojan horse. The email message is a trick used by the cybercriminals behind these spam emails, to coerce the recipients into believing that they have made a booking reservation at the Westminster Hotel.
Westminster Hotel Virus Email - Your Reservation is Now Confirmed July 2013
Online Threat Alerts

Westminster Hotel Virus Email - Your Reservation is Now Confirmed July 2013


Rating - Thumb up Rating - Thumb down 0   
Westminster Hotel Virus Email - Your Reservation is Now Confirmed July 2013

If you receive the malicious email message below, appearing as if it came from the Westminster Hotel, please do not open the attachment. The attachment is a malicious program or malware called a Trojan horse. The email message is a trick used by the cybercriminals behind these spam emails, to coerce the recipients into believing that they have made a booking reservation at the Westminster Hotel.

Please continue reading below.

This will therefore cause the curious recipient of this email message to open the malicious attachment, thinking he/she is opening a PDF document of the reservation made.

Here is a copy of the malicious Westminster Hotel Virus Email

malicious Westminster Hotel Virus Trojan Email

The name of the malicious attachment is: Document.pdf.exe. The name may change.  Although the name of the attachment has “.pdf” in it, it is not a PDF document.

The following threats were found after scanning the file Document.pdf.exe:

  • Win32/Injector.AJEG
  • Trojan-PSW.Win32.Tepfer.nprd
  • Trojan.Inject
  • Win32.ModifiedUPX.C

Now remember, a Trojan horse allows a cybercriminals to take control of your computer remotely from anywhere around the world. With remote control of your computer, they can use your computer to commit cybercrimes or steal your personal / financial information.

If you have already opened the malicious attachment, please do a full scan of your computer with the antivirus software installed on your computer.

Also, click here to view of a list of email attachments that you should never open.

Remember to leave your comment and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: info@onlinethreatalerts.com .

Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (0)