RECOMMENDATION: Be cautious of links in Office that claim to contain documents that could have been represented in the file itself rather than as a link, such as invoices.

Barracuda Security Insight

Last Updated: Sep 20, 2018, 00:00 AM (PST)

Current Threat Level: Severe

Current Cybersecurity Index: 166.9 25.8

  • 24 Hours
  • Previous 7 Days
  • Previous 30 Days
Zero-hour advanced threats in
last 24 hours
Total: 485,935
Email: 468,726
Web: 4,557
Network: 12,652

Critical Alerts

Affects: All OSes

Phishing PDFs have been observed as email attachments in phishing emails claiming to be DHL receipts. The PDF contains a bit.ly link to a spoofed Office365 sign in page.

Read More

Affects: Windows

Malicious RTF files masquerading as Word documents have been observed as email attachments in phishing emails claiming to be purchase orders. The spreadsheet downloads and runs a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached ACE files with .z file extensions have been observed on emails claiming to be requests for quotation. The archive contains a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached RAR files with .r00 file extensions have been observed on emails claiming to be sales contracts. The archive contains a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached ZIP files with .arj file extensions have been observed as email attachments claiming to be requests for quotation. The archive contains the Pony Trojan which attempts to steal passwords.

Read More

Affects: Windows

Malicious Word documents have been observed as email attachments in phishing emails claiming to be from CitiBank. The document downloads and runs a TrickBot loader when the malicious macro is run.

Read More