Get a Pentest and security assessment of your IT network.

News

No money, but Pony! From a mail to a trojan horse

The Pony Trojan was delivered through a recent spam campaign. The malware is often found attached to the e-mail as either an executable (also compressed, i.e. zip, rar or cab archive), sometimes pretending to be a different file format, like Dyreza a document (commonly PDF or some MS Office format) Instead of attaching the malicious file, attackers decide to just send a link and convince users to download the malware. The downloaded file tries to look trustworthy by using a well-known Adobe Reader icon and the filename security or infos”]

Source: https://blog.malwarebytes.com/threat-analysis/2015/11/no-money-but-pony-from-a-mail-to-a-trojan-horse/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin