<<<
NEWS FROM THE LAB - Tuesday, March 16, 2010
>>>
 

 
What do the Targeted Attack emails look like? Posted by Mikko @ 14:56 GMT

Over the years, we have multiple times posted examples of what kind of booby-trapped document files have been used in targeted (espionage) attacks.

For example:



However, we've rarely shown how these documents were delivered to the targeted, i.e. what the emails looked like.

For that kind of information, we can recommend you to visit a blog called Contagio Malware Dump.

This blog, run by Mila & co analyses targeted attacks in detail, typically showing the original spoofed emails that started the attacks.

Some good examples below — some of them are quite convincing. Would you have opened the PDFs?

contagio malware dump

contagio malware dump

contagio malware dump

More at: contagiodump.blogspot.com