{"id":1959,"date":"2016-04-07T06:56:50","date_gmt":"2016-04-07T06:56:50","guid":{"rendered":"http:\/\/pariswells.com\/blog\/?p=1959"},"modified":"2016-09-08T22:51:14","modified_gmt":"2016-09-08T22:51:14","slug":"crypto-email-template","status":"publish","type":"post","link":"https:\/\/pariswells.com\/blog\/random\/crypto-email-template","title":{"rendered":"Crypto Email Template"},"content":{"rendered":"<p>Useful email to send out to users to stop them click on Crypto Links<\/p><p>&nbsp;<\/p><p><em>Hello,<\/em><\/p><p><em>There is a virus doing the rounds called CryptoLocker currently . More can be found &#8211; <a href=\"https:\/\/en.wikipedia.org\/wiki\/CryptoLocker\">https:\/\/en.wikipedia.org\/wiki\/CryptoLocker<\/a><\/em><\/p><p><em>Putting it briefly, this virus is downloaded onto a computer usually by a fake email attachment or through a website popup. Once downloaded and run by accident , it starts encrypting all the company data on shared drives automatically and once completed will Ransom the data with an undisclosed amount to be paid anonymously. The only way to restore from this will be a restore from the backups the night before.<\/em><\/p><p><em>Please be vigilant with any emails you open from third parties you are not expecting and more importantly Message Attachments opened, below are some example of Email Message Spoofs\u2019<\/em><\/p><p>&nbsp;<\/p><p><em>&#8212;&#8211;Original Message&#8212;&#8211;<\/em><br \/><em> From: John Doe [<a href=\"mailto:John@mydomain.com\">mailto:John@mydomain.com<\/a>]<\/em><br \/><em> Sent: Tuesday, October 15, 2013 10:34 AM<\/em><br \/><em> To: Jane Doe<\/em><br \/><em> Subject: Annual Form &#8211; Authorization to Use Privately Owned Vehicle on State Business<\/em><\/p><p><em>All employees need to have on file this form STD 261 (attached). The original is retained by supervisor and copy goes to Accounting. Accounting need this form to approve mileage reimbursement.<\/em><\/p><p><em>The form can be used for multiple years, however it needs to re-signed annually by employee and supervisor.<\/em><\/p><p><em>Please confirm all employees that may travel using their private car on state business (including training) has a current STD 261 on file. Not having a current copy of this form on file in Accounting may delay a travel reimbursement claim.<\/em><\/p><p>&nbsp;<\/p><p><em><strong><u>Auspost <\/u><\/strong><\/em><\/p><p><em>Each computer became infected after opening an EMAIL from AUSTRALIA POST (or AUSPOST), with a subject line such as:<\/em><\/p><p><em>Subject: An agent was unable to redeem the parcel to your place for the reason: receiver was absent<\/em><\/p><p><em>There have been many different subject lines but they commonly want you to click on an attachment or a link such as \u201cDown Load Shipping Label\u201d<\/em><\/p><p><em>More info here: <a href=\"http:\/\/auspost.com.au\/about-us\/scam-email-warning.html\">http:\/\/auspost.com.au\/about-us\/scam-email-warning.html<\/a><\/em><\/p><p><em><strong><u>TNT Courier <\/u><\/strong><\/em><\/p><p><em><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1960 img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/tnt-264x300.png\" alt=\"tnt\" width=\"264\" height=\"300\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/tnt-264x300.png 264w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/tnt.png 494w\" sizes=\"auto, (max-width: 264px) 100vw, 264px\" \/><\/em><\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p><em><strong><u>Australian Federal Police<\/u><\/strong><\/em><\/p><p><em>Sample email:<\/em><\/p><p><em><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1961 img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/fed-279x300.jpg\" alt=\"fed\" width=\"279\" height=\"300\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/fed-279x300.jpg 279w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/04\/fed.jpg 662w\" sizes=\"auto, (max-width: 279px) 100vw, 279px\" \/><\/em><\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&nbsp;<\/p><p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; Another<\/p><p>&nbsp;<\/p><p><strong>CryptoLocker<\/strong> is a ransomware trojan which targeted computers running Microsoft Windows. CryptoLocker propagated via infected email attachments, usually in <strong>Scripts<\/strong> <strong>(<em>filename.bat<\/em>)<\/strong>, <strong>Word (<em>filename.doc<\/em> \/ .docx)<\/strong>, <strong>Excel (<em>filename.xls \/ .xlsx<\/em>)<\/strong>, <strong>Zip (<em>filename.zip \/ .rar<\/em>)<\/strong> or <strong>Executable files (<em>filename.exe<\/em>)<\/strong>.<\/p><p>&nbsp;<\/p><p>CryptoLocker encrypts files across local hard drives and mapped network drives. The process encrypts data files with certain extensions, including Microsoft Office, OpenDocument, and other documents, pictures, and database files. These files are then locked up and render inaccessible. Once it has done enough damage you will get a pop-up message similar to below:<\/p><p><img decoding=\"async\" src=\"https:\/\/mail.google.com\/mail\/u\/1\/?ui=2&amp;ik=94f6b340c0&amp;view=fimg&amp;th=155a2425b05a6337&amp;attid=0.3&amp;disp=emb&amp;attbid=ANGjdJ8LAQBNzjbZR1Mh9xCOpeRvVU3DbjkM2vhQ5_zRn18mV65dC7rBYv6nC18ri7tt27wiCNQe4S1SMw0yUnQw6s_azVfjo1yxckItge3zVMQIm5I_gyY4zoWTqiY&amp;sz=w860-h674&amp;ats=1473358006874&amp;rm=155a2425b05a6337&amp;zw&amp;atsh=1\" \/><\/p><p>Although CryptoLocker itself is readily removed, files remained encrypted in a way which many considered unfeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.<\/p><p>Since CryptoLocker has many version and has been evolving till date. It has been known to infect PCs even with up-to-date antivirus due to a term called \u201cZero-day malware\u201d which means a brand new variant that is not discovered by security companies.<\/p><p>\u201cA\u00a0<strong>zero<\/strong>&#8211;<strong>day<\/strong>\u00a0virus (also known as\u00a0<strong>zero<\/strong>&#8211;<strong>day malware<\/strong>\u00a0or next-generation\u00a0<strong>malware<\/strong>) is a previously unknown computer virus or other\u00a0<strong>malware<\/strong>\u00a0for which specific antivirus software signatures are not yet available. Traditionally, antivirus software relies upon signatures to identify\u00a0<strong>malware<\/strong>.\u201d<\/p><p>However, we can avoid getting caught from such infection as most of them comes in the following email form:<\/p><ul><li>Infringement notice<\/li><li>Court Cases<\/li><li>Water \/ Electricity Bills<\/li><li>Parcel collection from AusPost and other popular courier services<\/li><li>Banking services such as Paypal and even legitimate banks (Commbank, Westpac &amp; etc.)<\/li><\/ul><p>Below is an example Email which may contain CryptoLocker infection. This email does not come with any attachment however it has a few hyperlinks which is tempting users to click on in order to execute an attack from external source. Please pay attention to the red boxes for tips:<\/p><ol><li>Always check the sender name, in many cases they are completely random however there are chances that it may come from yourself (a.k.a email spoofing) or someone you know. You should be well aware that your colleague would not be such representative in sending you such emails.<\/li><\/ol><p><img loading=\"lazy\" decoding=\"async\" width=\"779\" height=\"353\" class=\"alignnone size-full wp-image-2190  img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb3d2be30.png\" alt=\"\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb3d2be30.png 779w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb3d2be30-300x136.png 300w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb3d2be30-768x348.png 768w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><\/p><ol start=\"2\"><li>Then next tip is <strong>without clicking on the links <\/strong>simply hover your mouse and Outlook should automatically show you the link you\u2019re about to visit. It will pop-out with an address as per below red box. A legit link from agl should have something more common like <a href=\"http:\/\/agl.com.au\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/agl.com.au&amp;source=gmail&amp;ust=1473444406881000&amp;usg=AFQjCNFtd_-94MhGYpEqb6Sw9kE-kvFlqw\">agl.com.au<\/a>. In some cases they can even create a fake link over what seems like a legit link like below example:<\/li><\/ol><p>&nbsp;<\/p><p>(<a href=\"https:\/\/www.google.com.au\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.google.com.au\/&amp;source=gmail&amp;ust=1473444406881000&amp;usg=AFQjCNFciJRJ3qIsJvMOLgxse0mBoyb-kg\">https:\/\/www.agl.com.au\/<\/a>)<\/p><p>&nbsp;<\/p><p>This is an example fake hyperlink created which actually goes to a completely different site. For this experiment I have embeded <a href=\"https:\/\/www.google.com.au\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.google.com.au&amp;source=gmail&amp;ust=1473444406881000&amp;usg=AFQjCNEZstOO3Aw0CUmwdR58XklwmXeIjQ\">https:\/\/www.google.com.au<\/a> on a <a href=\"https:\/\/www.agl.com.au\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.agl.com.au&amp;source=gmail&amp;ust=1473444406881000&amp;usg=AFQjCNFoMu4egiNYEBNB-z_10ZBA6g6aZg\">https:\/\/www.agl.com.au<\/a> text.<\/p><p><img decoding=\"async\" src=\"https:\/\/mail.google.com\/mail\/u\/1\/?ui=2&amp;ik=94f6b340c0&amp;view=fimg&amp;th=155a2425b05a6337&amp;attid=0.1&amp;disp=emb&amp;attbid=ANGjdJ_PL3x7lttI_BWxO6OoQ3nfwiKmcltbqdtQ6tsgQhPjmknngP4Mk6zPSMalIsRBXHowzJQ72GpGRyY5mUnakqgulisr6xgBi_YajUe44kOnc_rJDrpUJPiL2PY&amp;sz=w1042-h636&amp;ats=1473358006877&amp;rm=155a2425b05a6337&amp;zw&amp;atsh=1\" \/><\/p><p id=\"HPkfdiK\">\u00a0<\/p><p>I hope you find this informative and please pass on the message to everyone to help keep our network a safer environment.<\/p><p>&nbsp;<\/p><p>Below are a few more example emails and variations that disguised as potential CryptoLocker infection.<\/p><p><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"393\" class=\"alignnone size-full wp-image-2188  img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb2e3430e.png\" alt=\"\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb2e3430e.png 473w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb2e3430e-300x249.png 300w\" sizes=\"auto, (max-width: 473px) 100vw, 473px\" \/><\/p><p><img loading=\"lazy\" decoding=\"async\" width=\"465\" height=\"394\" class=\"alignnone size-full wp-image-2187  img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb2802419.png\" alt=\"\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb2802419.png 465w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb2802419-300x254.png 300w\" sizes=\"auto, (max-width: 465px) 100vw, 465px\" \/><\/p><p><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"337\" class=\"alignnone size-full wp-image-2186  img-responsive\" src=\"http:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb239e04b.png\" alt=\"\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb239e04b.png 605w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2016\/09\/img_57d1eb239e04b-300x167.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/mail.google.com\/mail\/u\/1\/?ui=2&amp;ik=94f6b340c0&amp;view=fimg&amp;th=155a2425b05a6337&amp;attid=0.5&amp;disp=emb&amp;attbid=ANGjdJ9aIxWcvo6T2KF6t1YHpYwacLRnNOYMFScrzIH8sjQMLoyriZFyVEcv_aamXBL9Ph44hd-qv7QmvSUZxNT2ay-aPOGj6N5ewGvyhVa-SPFNq0mSvvvl5SbNXPU&amp;sz=w1132-h788&amp;ats=1473358006878&amp;rm=155a2425b05a6337&amp;zw&amp;atsh=1\" \/><\/p><p id=\"LDysfRZ\">\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Useful email to send out to users to stop them click on Crypto Links&nbsp;Hello,There is a virus doing the rounds called CryptoLocker currently . More can be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[1419],"class_list":["post-1959","post","type-post","status-publish","format-standard","hentry","category-random","tag-cyrpto-email"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/1959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/comments?post=1959"}],"version-history":[{"count":3,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/1959\/revisions"}],"predecessor-version":[{"id":2191,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/1959\/revisions\/2191"}],"wp:attachment":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/media?parent=1959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/categories?post=1959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/tags?post=1959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}