SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers
Story image
New year rings in scams in the guise of Suncorp, MYOB, and ASIC emails
Mon, 8th Jan 2018
FYI, this story is more than a year old

MailGuard detected an email scam today using fake ‘Suncorp' branding.

Suncorp is an Australian finance, insurance, and banking corporation based in Queensland.

The email was detected by MailGuard this morning and is currently being sent out in large numbers.

The message shows the sender addresses ‘SunCorp Insurance' or ‘Health Insurance', but the emails actually originate from a compromised MailChimp account.

The email asks the recipient to download ‘insurance documents' and has a link pointing to an archived JavaScript file.

MailGuard reports that JavaScript files used in scams of this sort can contain malware such as Trojans, keystroke loggers and ransomware.

MailGuard advises users to be cautious and check your inbox to make sure you are not targeted by this scam.

Email scammers have already been actively targeting Australian email users, with MailGuard detecting one scam using MYOB branding and one using the Australian Securities and Investments Commission (ASIC) branding four days ago.

The MYOB message urges the recipient to click on a ‘view invoice' link, which points to a file archive on a compromised SharePoint account.

The archive file contains malicious javascript malware.

Meanwhile, the ASIC email scam has a .doc attachment which contains malicious macro code.

Although the message purports to be from ASIC, the sender URL is actually ‘asicsau[dot]com', a new URL registered on January 3 in China.

Cybercriminals use .doc macros in attachments like the one on this email to install malware on victim's computers.

Macros run in the background when .doc files are opened and can be used to download trojans, spyware and viruses.