Warning: The malware campaign hides the shadow of gift emails from Amazon

 This year is no exception when there have been a series of cyber attack campaigns recently discovered. The latest is a case of spreading Dridex malicious code in the form of gift emails from Amazon, which has been discovered by international security researchers.

Dridex is a modular banking trojan. When successfully infecting a victim's system, the malicious code can perform various malicious activities, including stealing login credentials, keylogging, screen capture, as well as downloading. and install additional malware… All of this was done in a stealthy manner without the knowledge of the system owner. Dridex is being spread publicly through a phishing email campaign that disguises itself as an Amazon Gift Card to deceive people who do not have much knowledge or security knowledge.

Dridex is considered particularly dangerous because it can provide DoppelPaymer and BitPaymer malicious agents with access to compromised networks. Thereby paving the way for ransomware attacks that can cause enormous damage.

Dridex scam campaign

When spreading malicious code, hacker gangs tend to take advantage of hot ongoing events or holidays as the subject of fraudulent campaigns. This makes it easier for victims to open up malicious attachments. That's exactly what's going on with the Dridex distribution campaign - with malicious email attachments disguised as gift vouchers from Amazon.

These emails are nicely designed, disguised as a message sending a $ 100 gift voucher from Amazon. If you want to accept the gift, the victim will have to click on the malicious attachment.

Warning: The malware campaign hides the shadow of gift emails from Amazon Picture 1

After just one click, malicious Word documents with names similar to 'Amazon_Gift_Card', 'Order_Gift_Cart' and 'Amazon_eGift-Card' are immediately downloaded to the victim's machine.

These attachments indicate that they were created in the online version of Microsoft Office, and prompt the recipient to click the 'Enable Content' button. If you do, the malicious macros will be downloaded. Soon, Dridex and possibly other types of malware will be present on the victim's system.

Warning: The malware campaign hides the shadow of gift emails from Amazon Picture 2

During today's year-end shopping rush, the gift card is clearly a popular tribute gift. However, it's important to remember that Amazon and most other e-commerce websites will never ask you to download something in exchange for a gift voucher. Instead, the legitimate email will contain a snippet that you can redeem right on the Amazon site quickly.

If you receive any emails that say gift certificates and prompt you to download attachments, avoid them immediately.

4 ★ | 1 Vote

May be interested

  • 25% of 'over-the-counter' phishing emails are the default security of Office 36525% of 'over-the-counter' phishing emails are the default security of Office 365
    a recent report showed that as many as 25% of all phishing emails were found after researchers conducted a series of 55 million emails that had previously been office 365 exchange online. protection (eop) - office 365's default security program is marked as' clean 'and of course has been reached by users' inboxes, while another 5.3% is whitelisted. instead of being blocked by administrators.
  • Photographic tips that cast shadows in photographyPhotographic tips that cast shadows in photography
    photographing shading becomes one of the photography topics chosen by many photographers. the drop shadow is completely different from the original image. depending on the shooting techniques and artistic look of each person, different products are produced.
  • Learn about Shadow ITLearn about Shadow IT
    in shadow it networks, complex infrastructure can evolve from everyday practice, without the approval or knowledge of the it department, including from the manageable hardware environment to solutions. complete erp solution.
  • Free license Ashampoo Anti-Malware 1.21 within 180 daysFree license Ashampoo Anti-Malware 1.21 within 180 days
    this information is derived from 2 jopo members and merlin magii - with a lot of contributions at cnet and other well-known information technology forums. this gift can be used within 180 days with the famous ashampoo anti-malware 1.21 program
  • Shadow IoT and the dangers come from this problemShadow IoT and the dangers come from this problem
    there are lots of interesting and interesting gadgets in internet of things (iot), but many of them don't have the proper security settings. this creates a problem called shadow iot, in which users can unknowingly allow hackers to gain access to the corporate network.
  • Warning, the botnet campaign called GhostDNS is taking over more than 100000 routersWarning, the botnet campaign called GhostDNS is taking over more than 100000 routers
    security researchers at netlab, a security firm of qihoo 360, recently discovered a malicious campaign called ghostdns took over more than 100,000 home routers, changing settings. dns and use malicious websites to steal user information.
  • Shadow command in WindowsShadow command in Windows
    (applies to windows server (semi-annual channel), windows server 2016, windows server 2012 r2, windows server 2012)
  • What is Shadow Profile on Facebook?What is Shadow Profile on Facebook?
    everyone knows that facebook collects personal data, but the shadow profile is one of the more intrusive methods that the social network uses.
  • How to Use Drop Shadow in GIMPHow to Use Drop Shadow in GIMP
    the drop shadow tool in gimp allows you to add professional-looking shadows to objects and text in your images. you can even add a shadow to the border of a photo so that it pops off the page in a document or website. the drop shadow tool...
  • Trojans appear to resolve the Windows patchTrojans appear to resolve the Windows patch
    websense has just released a newsletter warning users about a phishing campaign that provides windows patches via new email launched in the past week.