Skip to main content

Mass Scam Email Impersonating HKCERT Distributing Malware

Last Update Date: 25 Jan 2013 20:00 Release Date: 25 Jan 2013 4307 Views

RISK: High Risk

TYPE: Attacks - Malware

TYPE: Malware

HKCERT received an incident report related to a scam email on 25 Jan 2013. The scam email impersonated as HKCERT alert email sent to the public about an extremely critical vulnerability.

  1. The sender address of the scam email is "[email protected]", with the subject "保安漏洞:瀏覽器插件嚴重漏洞".
  2. The content of the scam email is in Chinese, and urged the recipient to install the so called "Adobe Flash Player patch" attached in the email.
  3. The file is already verified as a malware by our analysis. If the target system is infected by the malware attachment, it will connect to the website w w w . c a t n m e n . c o m. The website was unavailable at the time of analysis.

System / Technologies affected

  •  Certain Windows platforms

Solutions

Detection

  1.  The infected system will have the following folders/files created:
    • %AppData%\httpsrv.exe
    • %Temp%\adobe_flashplayer11x32_installer.exe
    • %Temp%\adobe_flashplayer11x32_update.exe
  2. The following anti-virus applications can detect the scam email attachment as malware:
    • AVG
    • BitDefender
    • DrWeb
    • F-Secure
    • Kaspersky

Prevention

  1. The scam email is sent from 122.10.35.156. In mail server/firewall, deny access from this IP address.
  2. HKCERT have never sent any email on behalf of "[email protected]". Besides, the vulnerability alert email sent by HKCERT will not have any file attached. Do not open any file attached in the scam email.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link