ACH debit transfer malware
Wire transfer fraud is on the rise, so it is no surprise that another 'ACH debit transfer' scam would be released into the wild, aka cyberspace. The latest email scam being randomly sent from spoofed accounts rotates amongst five subject matters:
- ACH payroll payment was not accepted by Central Trust and Savings Bank.
- ACH debit transfer was hold by Yolo Community Bank.
- Funds transfer was hold by our bank.
- ACH transfer was not accepted by Eldorado Bank.
- ACH debit transfer was hold by The Mechanics Bank.
Possibly a compromise of third-party databases housing personal and key data helped plan the attack. For instance, emails may target customers of banks 1, 2, 3, or 4, and, for all others, the generic reference (5) is sent.
Below is the body of the tainted email, although the variables might change depending on the target, i.e. bank customer:
Dear Madam / Sir,
I regret to inform you that ACH payroll payment initiated by you or on your behalf was not accepted by Central Trust and Savings Bank.
Transaction ID: 17036653478735
Current status of transaction: on hold
Please review transaction details as soon as possible.
Theodore Parham
Payments Administration
Central Trust and Savings Bank
Persons who click on the 'review transaction details' hyperlink will be rerouted to a malicious page or link such as hxxp://openmindcomputech(dot)com/afin.html and hxxp://xxx.ebappcc(dot)com/zfin.hxxl. The supposed 'transaction details' page will be hidden behind the error and dialog box below:
Your version of Macromedia Flash Player is too old to continue. Download and install the latest version of Adobe Flash Player.
Of course, the Flash Player Update is fake and, if downloaded, brings aboard a nasty Trojan (file name: update flash.exe).
Once loaded, the Trojan will make several registry changes, one that arranges for its poisonous executable to run at every Windows start. The Trojan will also open the port 11760 and establish a connection to IP 64.252.17.231.
All malware is charged with one or more payloads, in other words a goal or intended purpose. If you don't have a stealth anti-malware in place, which offers real-time alerts or uses behavioral analytics to stay atop of evolving infections, you may not be aware a hacker is lurking in the background. While you can remove some infections manually, a malware that is fortified by rootkit technology may not be so easy to find or remove. Rootkit technology helps bury or mask malicious files using familiar naming conventions. Deleting the wrong files could cause irreparable damage and you could lose all your valuable data. For this reason, it might be best to rely on a reputable anti-malware tool known to contain an anti-rootkit feature and be able to remove all infections safely, including the ones hiding out in your system kernel or BIOS.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | update flash.exe | |
2. | updateflash.exe | |
3. | %Temp%\tmp7f99c3f9.bat | |
4. | %AppData%\Igobig\ziywe.exe | |
5. | %AppData%\Igobig | |
6. | %AppData%\Efoxq | |
7. | %AppData%\Efoxq\ozabp.ugu.0 | |
8. | %AppData%\Efoxq\ozabp.ugu |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.