{"id":329,"date":"2015-12-10T23:20:17","date_gmt":"2015-12-10T23:20:17","guid":{"rendered":"http:\/\/blog.paranoidprofessor.com\/?p=329"},"modified":"2016-09-21T14:00:12","modified_gmt":"2016-09-21T14:00:12","slug":"a-cautionary-tale-email-attachments","status":"publish","type":"post","link":"https:\/\/blog.paranoidprofessor.com\/index.php\/2015\/12\/10\/a-cautionary-tale-email-attachments\/","title":{"rendered":"A cautionary tale &#8211; email attachments"},"content":{"rendered":"<p>So my sister sent me an email as there were problems at work, as luck had it she was out of the office when she got this from bookkeeping.<\/p>\n<p><a href=\"http:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/shadow-copy-service.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-332 aligncenter\" src=\"http:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/shadow-copy-service-300x149.jpg\" alt=\"shadow-copy-service\" width=\"523\" height=\"260\" srcset=\"https:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/shadow-copy-service-300x149.jpg 300w, https:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/shadow-copy-service-1024x510.jpg 1024w\" sizes=\"(max-width: 523px) 100vw, 523px\" \/><\/a>She couldn&#8217;t make heads nor tails of it.\u00a0 To be honest, I have been working most of the versions of Windows and this sounded pretty odd to me. The user kept pressing no but the dialog kept coming back. When my sister got back to the office she ran malwarebytes to check out the situation.<\/p>\n<h2 style=\"text-align: center;\"><strong><a href=\"https:\/\/blog.kaspersky.com\/teslacrypt-20-ransomware\/9314\/\">ransom.teslacrypt<\/a><\/strong><\/h2>\n<p>Wow, so it seems like they have managed to get the teslacrypt virus. Not just any virus, but something that encrypts your files and then they want you to pay them to decrypt them.\u00a0 Traditionally there is no honor amongst thieves, so it is in doubt if they would hold up to their end and actually decrypt the files even if they were paid.\u00a0 I am not going to infect my pc to test that hypothesis.<\/p>\n<h2>How did this happen<\/h2>\n<p>I was kicking this around with my colleague and so we were wondering just what naughty web site was being surfed to get such a virus.\u00a0 It is a small office, so there is not much in the way of restrictions.<\/p>\n<p>Perhaps to ensure this doesn&#8217;t happen again, should they install a proxy server?\u00a0 Do they need a different firewall solution?\u00a0 None of the users have administrator privileges.\u00a0 Is there something was overlooked?<\/p>\n<p>Soul searching was done and a lot of questions were asked in addition to checking out the machine itself.\u00a0 It turns out that the reason why this happened was a lot simpler than Robert was hitting the porn sites on his lunch break.<\/p>\n<p>It seems that Sally in bookkeeping received an email from an unknown person with an attachment of an &#8220;invoice&#8221; to needing to be paid.\u00a0 So Sally clicked on the attachment which came up and within seconds she knew that there was nothing that they needed to pay, <strong><em>click click click<\/em><\/strong>.\u00a0 Closed the attachment and deleted the email.\u00a0 It was shortly after this email that the odd behaviors started to occur.<\/p>\n<p>There have been some good analysis of this virus such as <a href=\"http:\/\/blogs.cisco.com\/security\/talos\/teslacrypt\">this one<\/a>.\u00a0 That explains the deletions of the shadow copy that were being displayed.<\/p>\n<p><a href=\"http:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/delete-shadows.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-330 aligncenter\" src=\"http:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/delete-shadows-300x197.jpg\" alt=\"delete-shadows\" width=\"484\" height=\"318\" srcset=\"https:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/delete-shadows-300x197.jpg 300w, https:\/\/blog.paranoidprofessor.com\/wp-content\/uploads\/2015\/12\/delete-shadows-1024x673.jpg 1024w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/a>From the <a href=\"http:\/\/blogs.cisco.com\/security\/talos\/teslacrypt\">breakdown<\/a> about how this virus worked, it was really well done &#8211; with an evil intent &#8211; but well programmed none the less.<\/p>\n<h2>Lessons learned<\/h2>\n<p>There is no hard and fast rules for common sense, but easy does it, or look before you leap sound like a good advice.<\/p>\n<p>I get a questionable emails every few days just like everyone else.\u00a0 What do the these emails want?<\/p>\n<ol>\n<li>click on this link to see sexy photos<\/li>\n<li>click on the attached photo<\/li>\n<li>check out my overdue bill<\/li>\n<li>bank transfer problems statement<\/li>\n<li>my travel itinerary<\/li>\n<\/ol>\n<p>My favorites are the attachments with the names crafted for people who are only paying superficial attention to what is attached.<\/p>\n<p>invoice-26282.pdf.exe<br \/>\nprom_picures.jpg.exe<\/p>\n<p>The main lesson should be that you cannot click on just anything that is attached to your email.\u00a0 This is true if this is from <strong>unknownperson@sketchydomain.cj<\/strong> or your <strong>mom<\/strong>.\u00a0 It is possible for some of these virus&#8217;s to send out emails from your account to your friends in your contacts.<\/p>\n<p>If the email doesn&#8217;t sound like it came from your friend or your family member, cast a skeptical eye on it.\u00a0 Don&#8217;t open the attachment, make a phone call send an email of your own asking about the email you received.\u00a0 If in doubt, simply delete it.<\/p>\n<h2>Final thoughts<\/h2>\n<p>You cannot be careful enough when surfing, opening emails, or running new programs.\u00a0 Below is a small list of some best practices to help keep your computer running virus free.<\/p>\n<ul>\n<li>Disable Outlook previews<\/li>\n<li>Ensure that all security updates and patches are installed<\/li>\n<li>Keep your software up to date with the latest versions<\/li>\n<li>Use Anti Virus sofware<\/li>\n<li>Think before you click on links or attachments<\/li>\n<li>Think before downloading new programs or utilities<\/li>\n<li>Disable autorun<\/li>\n<li>Use hardware firewall<\/li>\n<li>Company should use a proxy server<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>So my sister sent me an email as there were problems at work, as luck had it she was out of the office when she got this from bookkeeping. She couldn&#8217;t make heads nor tails of it.\u00a0 To be honest, &hellip; <a href=\"https:\/\/blog.paranoidprofessor.com\/index.php\/2015\/12\/10\/a-cautionary-tale-email-attachments\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[54],"_links":{"self":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/329"}],"collection":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":6,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/329\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/329\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/media?parent=329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/categories?post=329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/tags?post=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}