Post Now
Image

Have you received an invitation for a Halloween party via email? Be aware of the Emotet malware campaign that employed spam emails and invite recipients to a Halloween party.

Have you received an invitation for a Halloween party via email? Be aware of the Emotet malware campaign that employed spam emails and invite recipients to a Halloween party.

BleepingComputer spotted Emotet operators creating an email pretending to be an invite to a Halloween party to trick you into opening the malicious attachment.

Experts report that the threat actors are using unique subjects like Halloween Party, Happy Halloween, Halloween invitation etc.

The malicious files used in this campaign have different names, such as Inviting friends to your Halloween party invitation.doc, Halloween Extravaganza.doc, Halloween Pot Luck 10.31.doc, Halloween party.doc and Halloween.doc.

Source @BleepingComputer

Even though the email subjects and text vary, the general idea is that you are being invited to a Halloween party, with all the details in the attached malicious document.

Microsoft Security Intelligence researchers also warn of the ongoing Halloween-themed Emotet campaign.

When a user opens the attachment, they will be directed to a page with the standard “Enable Editing” and “Enable Content” button. As soon as the user clicks the button, Emotet Trojan gets installed on the computer.

The template used in the Halloween Emotet campaign asks recipients to upgrade their Microsoft Word version by enabling the content.

Emotet malware has been active since 2014, where the infection spreads through emails containing a malicious attachment.

Recent spam campaigns used messages with malicious Word documents, or links to them, pretending to be an invoice, shipping information, purchase orders, COVID-19 information, resumes, financial records and information about President Trump's health.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?