Submit your comments on this article |
-Lurid Crime Tales- |
FBI ESOC has identified an active spearfisching campaign |
2015-07-21 |
FBI Enterprise Security Operation Center (ESOC) has identified an active spearfisching campaign that is targeting US government, private sector, and personal email accounts. Be extremely cautious when reviewing all email accounts. If you were not expecting an email, you do not recognize the sender, or you do not recognize the link in the email, do NOT click on any links or attachments. Preliminary information indicates this campaign is extremely widespread and may be targeting a large number of users. These emails are coming from various email addresses and are spoofing government email addresses as well as universities to make them appear more legitimite. The email subjects have included the following: Scan from a Xerox WorkCentre PRO Scan from a Xerox WorkCentre FAX REPORT (Scanned from a Xerox machine) INCOMING FAX REPORT (Scanned from a Xerox machine) Scan from a Xerox Phaser MFP Scanned from a Xerox Multifunction Device The emails usually contain links to .ZIP files, in a format similar to the following: https[:]//domain[.]com/efax/incoming/######/####.ZIP In other words - if you don't recognize it = DELETE IT. No Link available. Passed from a USG INFOSEC source. |
Posted by:Besoeker |
#2 We've seen a couple of these already this week. Deleted them per SOP with a similar philosophy as the memo. Thanks! |
Posted by: Mullah Richard 2015-07-21 16:45 |
#1 If you were not expecting an email, you do not recognize the sender, or you do not recognize the link in the email, do NOT click on any links or attachments. That should be SOP anytime. |
Posted by: Procopius2k 2015-07-21 15:38 |