Virus Email - "Payment Advice Note from 27.08.2014"

The email message below with the subject: "Payment Advice Note from 27.08.2014," has a virus or Trojan horse attached to it that will infect your Windows computer if you open it. The message was designed to trick the recipients into opening the malicious attachment, disguised as a Payment Advice Note PDF document. So, if you receive the same email message, please do not attempt to open the attachment.

Virus Email - Payment Advice Note from 27.08.2014

The Virus Email Message

Subject: Payment Advice Note from 27.08.2014
Attachment: Payment_Advice_Note _27.08.2014.PDF.zip

Disclaimer:

***********

This e-mail is intended solely for the use of the individual to whom it is addressed. Any views or opinions presented are solely those of the author and do not represent those of AL-KO KOBER Limited.

It may also contain information, which may be privileged and confidential and subject to legal privilege.

If you are not the intended recipient, you may not peruse, use, disseminate, distribute or copy this message. If you have received this message in error, please notify the sender immediately by email, facsimile or telephone and return or destroy the original message.

AL-KO KOBER Limited is Registered in England at Companies Registration Office Cardiff with Company number: 492005. AL-KO KOBER Limited, South Warwickshire Business Park, Kineton Road, Southam,

Warwickshire, CV47 0AL.

Cell 816 838-9999

The attachment "Payment_Advice_Note _27.08.2014.PDF.zip" contains the malicious file "Payment_Advice_Note _27.08.2014.PDF.scr".

Note: The attachment name may change.

We found the following threats after scanning the malicious file:

  • Trojan.DownLoad3.32510
  • Win32/Injector.BKUB
  • W32/BKUB!tr
  • HEUR/Malware.QVM20.Gen
  • Troj/Zbot-IVD

The cybercriminals behind these malicious email messages aims are to trick the curious recipients into opening the malicious attachment that will infect their computers with a virus or Trojan horse.

Once your computer has become infected with this malicious Trojan horse, the cybercriminals behind this email message will be able to access and take control of your computer remotely from anywhere around the world. They may spy on you, use your computer to commit cybercrimes, or steal your personal and financial information.

Now, if you have already opened anyone of these malicious attachments, please do a full scan of your computer with the antivirus software installed on it. The name of the attachment may change, so be careful when opening email attachments.

If you don’t have antivirus software installed on your computer, please click here for a list of free antivirus software.

Never open an attachment that has a name ending with “.scr”, because these are computer programs that can infect your computer with a virus or some other malware.

Click here for a list of email attachments you should never open, regardless of where they came from.

For a list of other virus email messages, please click here.

Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search Search engine.

Note: Some of the information in samples on this website may have been impersonated or spoofed.
Was this article helpful?  +
Share this with others:

Comments, Questions, Answers, or Reviews

There are no comments as yet, please leave one below or revisit.

To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews. NB: We will use your IP address to display your approximate location to other users when you make a post. That location is not enough to find you.

Your comment, answer, or review will be set as anonymous because you are not signed in. An anonymous comment, answer, or review cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.

Write Your Comment, Question, Answer, or Review

Virus Email - "Payment Advice Note from 27.08.2014"