#Privacy: Thanksgiving eCards found spreading malware

Malicious Thanksgiving Day eCards are now distributing the Emotet Trojan and other malware.

Discovered by BleepingComputer, a new malicious email campaign, attached with a malicious Word document disguising itself as a Thanksgiving Day Greeting Card, has been unearthed.

The email appears to be sent from someone sending the greeting card and wishing the victim a nice holiday.

If a user opens the malicious document, they are instructed to “Enable Content” or “Enable Editing” to which if clicked, the obfuscated macros within the document will execute and install malware onto the victim’s computer.

Once the malware is launched, it will perform multiple tasks such as stealing stored passwords, downloading further malware, and even providing a backdoor to other threat actors, or in the case of Emotet, installing ransomware.

Another spam campaign, discovered by Cryptolaemus, distributes fake work-related or finance-related emails. The email template tells the user that they are closed during the holiday period, creating a sense of urgency which encourages immediate opening of the malicious document. Like the previous campaign mentioned, once the attachment is opened, the Emotet Trojan is downloaded and launched.

Users are urged to refrain from opening attachments from unknown senders. In addition, if a document asks you to Enable Content or Enable Editing – there should be a cause of concern, especially if the document is not from a legitimate email.

Join our free-to-attend digital event, Last Thursday in Privacy, addressing data protection, privacy and security challenges including working from home, COVID-19, global regulations and more. Visit https://digital.privsec.info/.

We have been awarded the number 1 GDPR Blog in 2019 by Feedspot.