RECOMMENDATION: Be cautious of links in Office that claim to contain documents that could have been represented in the file itself rather than as a link, such as invoices.

Barracuda Security Insight

Last Updated: Sep 22, 2019, 18:00 (PST)

Current Threat Level: Severe

Current Cybersecurity Index: 190.7 11.3

  • 24 Hours
  • Previous 7 Days
  • Previous 30 Days
Zero-hour advanced threats in
last 24 hours
Total: 167,409
Email: 164,382
Web: 439
Network: 2,588

Critical Alerts

Affects:

Email with attached ISO files have been observed on emails claiming to be invoices. These ISO files contain a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Malicious Word documents have been observed as email attachments in phishing emails claiming to be requests for quotation. The documents downloads and runs a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached GZip files have been observed on emails claiming to be cargo shipping requests. These GZip files contain a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Malicious RTF files masquerading as DOC files have been observed as email attachments in phishing emails claming to be invoices. The document downloads and runs the Pony Trojan which attempts to steal passwords.

Read More

Affects: Windows

Email with attached GZip files have been observed as email attachments claiming to be a tanker for sale. The archive contains the Pony Trojan which attempts to steal passwords.

Read More

Affects:

Email with attached ISO files have been observed on emails claiming to be invoices. These ISO files contain a LokiBot variant that attempts to steal Windows and browser passwords.

Read More