.UU Executable File Virus Email Attachments
A Sample of a Fake Email with a Malicious ".uu" File Attached
overdue payment advice ref:927-4--27
Tue 3/12/2019 2:38 AM
Attachment: payment overdue invoice.uu (742 KB)
Please find attached payment transfer to your company account today
Kindly be informed that our client has requested us to send you a copy of payment advice.
Please let us know once you have received payment in your account.
Regional Sales Executive
The malicious attachment (.uu) contains a malware called “Backdoor:Windows/Adwind” that installs a malicious component or codes onto your computer, which opens a backdoor on it. Once the backdoor is open on your computer, the cybercriminals behind the malicious email message will be able to access your computer silently, infect your computer with other malware, steal your information, and may use your computer to commit other cybercrimes that will be traced back to your computer. If this should happen to you, do not be surprised if one day you see the police at your doorsteps with a warrant to search your home and confiscate your computer, because some form of online criminal activities, which you know nothing about, were traced back to your location and computer.
Most antivirus software will detect and remove the malicious attachment before it infects your computer. But, the smart thing to do, is to delete the email message.
Online users who have received the fake email messages and have been tricked into opening the malicious “.uu” attachment are asked to do a full scan of their computers with their antivirus software.
What is a .UU file?
"UU," which stands for "Unix to Unix encoding," is most commonly used to transfer files on Unix-based systems. It is a file created by uuencode, a Unix program used for converting binary data to text; contains the textual encoding of an original binary file; often used to email a binary file in a text format so that the file does not become corrupted.
Check the comment section below for additional information, share what you know or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Click here help maintain Online Threat Alerts (OTA).
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
NB: We will use your IP address to display your approximate location to other users.
Recommendations / Ads