轉到主要內容
|
0 分鐘閱讀

New spam delivers fake booking.com hotel reservations

Get a Demo of Forcepoint Solutions

Now is tourist season when lots of people are using online services to book hotels or flights. The Websense® ThreatSeeker® Network has detected spammers who are using fake booking.com email addresses to send hotel reservation confirmations with malware to unsuspecting users. 

Here's what the spam email looks like:

 

The sample email consists of a fake confirmation letter from "booking.com," which includes random arrival and departure dates and some other information. Attached to it is a .zip file:

 

 

Decompressing the .zip file exposes a malicious executable file, Hotel-Electronic-Reservation.exe. If users click on the file to run it, malware is installed. The Websense ThreatScope Analysis Report shows the specific behavior of this malware: 

When running, the malware tries to connect to the internet to download other malware files.

 

It also drop files into special folders and runs them automatically:

Websense customers are protected proactively against this compromise by ACE, our Advanced Classification Engine. Our real-time analytics also proactively identify several variants of this threat, and with the ThreatSeeker Network, we receive feedback in our email solutions that blocks messages containing these URLs and malicious files. 

      在文章中

      X-Labs

      Get insight, analysis & news straight to your inbox

      直奔主題

      網絡安全

      涵蓋網絡安全領域最新趨勢和話題的播客

      立即收聽