Examples of subject lines of the email used by the attackers

  • Re:Invoice
  • PO
  • Remittance Advice
  • Payment Advise
  • Quotation Required
  • Transfer Copy
  • TT Payment
  • PAYMENT REMITTANCE
  • INQUIRY
  • Qoutation
  • QUOTATION
  • Request for Quotation

Huge impact with few resources

  • While advanced attack groups attract a lot of attention in the news, it’s important to remember that less skilled attackers can still cause major damages to a targeted company.
  • Even though the attackers in this case have limited resources, they can use Backdoor.Breut and Trojan.Nacrat to gain total access to a computer.
  • By focusing their RAT infections on specific employees, the attackers can potentially steal a substantial amount of money and sensitive information from affected businesses.

Take these measures to prevent the attack

  • If you do not have in-house tech support, retain the services of a tech support service
  • Keep security software up to date
  • Do not open attachments or click on links in suspicious email messages
  • Avoid providing any personal information when answering an email
  • Never enter personal information in a pop-up web page
  • If you’re uncertain about an email’s legitimacy, contact your computer consultant

Photo: Warner Bros (promotional)