Re: [Hampshire] Nasty email purporting to come from the US

Top Page
Author: Daniel Llewellyn
Date:  
To: hampshire
Subject: Re: [Hampshire] Nasty email purporting to come from the US

Reply to this message
gpg: failed to create temporary file '/var/lib/lurker/.#lk0x58695100.hantslug.org.uk.5064': Permission denied
gpg: keyblock resource '/var/lib/lurker/pubring.gpg': Permission denied
gpg: Signature made Fri Apr 22 00:28:22 2016 BST
gpg: using RSA key 5C7C5EBA43A55951
gpg: Can't check signature: No public key

On 21/04/16 21:10, Ian Park wrote:
> "Purchase Order, 11300 / 0002323808, has been Dispatched. Please detach
> and print the attached Purchase Order."
>
> The attachment was a .tgz file containing a 6.2kB javascript file - a
> method of attack which I haven't seen before. Needless to report that I
> didn't attempt to run said javascript file! Has anyone else come across
> this method of attack?


Yes, I've seen many similar to these over the past month. They started
sending sometime in february or march and my own spambox has been
inundated with variations on the theme trying to catch-me-out and get me
to open one of the malware-laden attachments.

--
Daniel Llewellyn | PGP/GnuPG Key ID: 0x0349ED21
4C9C BFAD 0069 D679 9660 BCD5 40C2 D958 0349 ED21
--
Please post to: Hampshire@???
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--------------------------------------------------------------