RECOMMENDATION: Be cautious of file extensions you don't recognize in email attachments and on the web as these are used to trick Windows users into opening malicious files.

Barracuda Security Insight

Last Updated: Nov 17, 2018, 12:00 (PST)

Current Threat Level: Severe

Current Cybersecurity Index: 214.6 23

  • 24 Hours
  • Previous 7 Days
  • Previous 30 Days
Zero-hour advanced threats in
last 24 hours
Total: 30,548
Email: 27,893
Web: 1,182
Network: 1,473

Critical Alerts

Affects: All OSes

Phishing PDFs have been observed as email attachments in phishing emails claiming to be DHL receipts. The PDF contains a bit.ly link to a spoofed Office365 sign in page.

Read More

Affects: Windows

Malicious RTF files masquerading as Word documents have been observed as email attachments in phishing emails claiming to be purchase orders. The spreadsheet downloads and runs a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached ACE files with .z file extensions have been observed on emails claiming to be requests for quotation. The archive contains a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached RAR files with .r00 file extensions have been observed on emails claiming to be sales contracts. The archive contains a LokiBot variant that attempts to steal Windows and browser passwords.

Read More

Affects: Windows

Email with attached ZIP files with .arj file extensions have been observed as email attachments claiming to be requests for quotation. The archive contains the Pony Trojan which attempts to steal passwords.

Read More

Affects: Windows

Malicious Word documents have been observed as email attachments in phishing emails claiming to be from CitiBank. The document downloads and runs a TrickBot loader when the malicious macro is run.

Read More