bell Warning! JavaScript is disabled! To take full advantage of our site and functionality, we recommend you enable it.
Online Threat Alerts (OTA)  - Alerting you to cyber threats lurking on the internet.

Virus Email: Kindly open to see export License and payment invoice attached

Date: July 11, 2013 12:17 PM - Views: 2,035 - Article ID:5065 - Comment: 0
Virus Email: Kindly open to see export License and payment invoice attached

If you receive the malicious email message below, please do not open the attachment. The attachment is a malicious program or malware called a Trojan horse. The email message is a trick used by the cybercriminals behind these spam emails, to coerce the recipients into believing that they have received some form of payment.

This will therefore cause the curious recipient of this email message to open the malicious attachment, thinking he/she is opening an invoice.

Here is a copy of the virus email 


---

Subject: invoice copy

Kindly open to see export License and payment invoice attached,
meanwhile we sent the balance payment yesterday.

Please confirm if it has settled in your account or you can call if there is any problem.

Thanks
Karen parker


---

The name of the email attachment is "Invoice copy.zip". This file contains the malicious program or malware: "invoice copy.exe".

The following threats were found after scanning the file "Invoice copy.zip" or "Invoice copy.exe"

  • UDS:DangerousObject.Multi.Generic
  • Trojan.Zbot

Now remember, a Trojan horse allows a cybercriminals to take control of your computer remotely from anywhere around the world. With remote control of your computer, they can use your computer to commit cybercrimes or steal your personal / financial information.

If you have already opened the malicious attachment, please do a full scan of your computer with the antivirus software installed on your computer.

Also, click here to view of a list of email attachments that you should never open.

View, submit comments and answer questions below. If you want to receive alert notifications, please click here to register.

Alert others by sharing this article with them.

Send this to someone via email:
Email address:
Like our Facebook page at: www.facebook.com/OnlineThreatAlerts
Follow us on Twitter at: www.twitter.com/onlinethreatale
Click the following thumb up or down, if you like or dislike this alert.
Rating: Thumb up 1 likes Rating: Thumb down 0 dislikes   

Tell us what you know or ask a question regarding this alert, by leaving a comment below. If you ask a question, please revisit to view the answers.If you have a question about something different from what this alert is about, do not post it below, instead, send that question to us using our contact us form. Click here to contact us.

Read the comments below, if there are any, before posting your comment or question. Someone may have already answered your question. Duplicate questions or answers will be deleted.


Your comment should not consist of all capital letters because it denotes shouting and shouting at other users is not acceptable.

If you want to receive email notifications when someone makes a comment, asks or answers a question, please click here to register. Anonymous users do not receive email notifications.

Comments or Questions (0)

There are no comments or questions. Be the first person to make a comment or ask a question.

About us   Advertise with us   Contribute to OTA   Report Cyber Threats    Mobile websiteMobile Website   RSS FeedRSS Feed   Contact us   Privacy Policy   Terms and Conditions   This site uses cookies to offer you a complete experience. Learn more.   Copyright © 2012 - 2014 Online Threat Alerts (OTA).