Previous  bell    Next
bell Warning: JavaScript is turned off! Some features on this website will not work without it.

Macro Virus Email Message - "UK Fuels E-bill"

The email message below with the subject: "UK Fuels E-bill," has a malicious Microsoft Word document attached to it that will infect your computer if you open it. The message is a fake e-bill invoice document, designed to trick the recipients into opening the malicious attachment disguised as an invoice. So, if you receive the same email message, please do not attempt to open the attachment.
Macro Virus Email Message - "UK Fuels E-bill"
Online Threat Alerts

Macro Virus Email Message - "UK Fuels E-bill"


Rating - Thumb up Rating - Thumb down 0   
Macro Virus Email Message - "UK Fuels E-bill"

The email message below with the subject: "UK Fuels E-bill," has a malicious Microsoft Word document attached to it that will infect your computer if you open it. The message is a fake e-bill invoice document, designed to trick the recipients into opening the malicious attachment disguised as an invoice. So, if you receive the same email message, please do not attempt to open the attachment.

Please continue reading below.

The Virus Email Message

From: invoices @ebillinvoice.com
Subject: UK Fuels E-bill
Customer No : 35056
Email address : [your email address]
Attached file name : 35056_49_2014.doc

Dear Customer

Please find attached your invoice for Week 49 2014.

In order to open the attached DOC file you will need the software Microsoft Office Word.

If you have any queries regarding your e-bill you can contact us at invoices @ebillinvoice.com.

Yours sincerely

Customer Services

UK Fuels Ltd

This email, its content and any files transmitted with it are confidential and intended solely for the use of the individual(s) to whom it is addressed.

If you are not the intended recipient, be advised that you have received this email in error and that any use, dissemination, forwarding, printing or copying of this email is strictly prohibited.

The email message contains a Microsoft Word document that contains a set of Macro instructions that will download a malicious file from the following compromised websites:

  • KAFILATRAVEL.com/js/bin.exe
  • imperialenergy .ca/js/bin.exe

The malicious Microsoft Word document is dangerous to you if you open it and enable "Macros" or enable content.

The cybercriminals behind these malicious email messages aims are to trick the curious recipients into opening the malicious attachment, which will infect their computers with a virus or Trojan horse.

Once their computers have become infected with this malicious Trojan horse, the cybercriminals behind this email message will be able to access and take control of their computers remotely from anywhere around the world. They may spy on them, use their computers to commit cybercrimes, or steal their personal and financial information.

Now, if you have already opened the malicious attachment, please do a full scan of your computer with the antivirus software installed on it. The name of the attachment may change, so be careful when opening email attachments.

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

For a list of other virus email messages, please click here.

Remember to leave your question or comment, and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: info@onlinethreatalerts.com .

Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (0)