NOC Services
Current status of our all services
Malicious Email: “Invoice”
We are seeing malicious emails titled: “Invoice” From: “Ivan Jarman” ( IJarman@sportsafeuk.com ) These contain a malicious .DOC, .DOCM, .DOCX, .PDF, .XLS, .XLSM, .XLSX, .XML or .ZIP attachment or a malicious link. DO NOT open the attachment, instead please forward[...]
read moreMalicious Email: “Transfer”
We are seeing malicious emails titled: “Transfer” From: “Integrated Petroleum Services” ( ipseq@orange.gq ) These contain a malicious .DOC, .DOCM, .DOCX, .PDF, .XLS, .XLSM, .XLSX, .XML or .ZIP attachment or a malicious link. DO NOT open the attachment, instead please[...]
read moreMalicious Email: “Aline: Tax Invoice #40525”
We are seeing malicious emails titled: “Aline: Tax Invoice #40525” From: “Burce Sharpe” ( bruce@alinepumps.com ) These contain a malicious .DOC, .DOCM, .DOCX, .PDF, .XLS, .XLSM, .XLSX, .XML or .ZIP attachment or a malicious link. DO NOT open the attachment,[...]
read moreMalicious Email: “Invoice Document SI528880”
We are seeing malicious emails titled: “Invoice Document SI528880” From: Lucie Newlove ( lucie@hiderfoods.co.uk ) These contain a malicious attachment which contains a Trojan Downloader, W97M/Downloader.arn (ED) DO NOT open the attachment, instead please forward to virus.scan@systemforce.co.uk and then delete[...]
read moreMalicious Email: “DJL Payment”
We are seeing malicious emails titled: “DJL Payment” From: “Abigal Decker” ( wanchai@toshibamachineth.co.th ) These contain a malicious .DOC, .DOCM, .DOCX, .PDF, .XLS, .XLSM, .XLSX, .XML or .ZIP attachment or a malicious link. DO NOT open the attachment, instead please[...]
read moreMalicious Email: “Your car rental invoice from Avis, No. E947168460”
We are seeing malicious emails titled: “Your car rental invoice from Avis, No. E947168460” From: “noreply@avis-billing.com” These contain a malicious attachment which contains a Trojan Downloader, W97M/Downloader.arn (ED) or W97M/Download.ark DO NOT open the attachment, instead please forward to virus.scan@systemforce.co.uk[...]
read moreMalicious Email: “IMPORTANT! U.S. Treasury Department. Restrictions Applied!”
We are seeing malicious emails titled: “IMPORTANT! U.S. Treasury Department. Restrictions Applied!” From: “USA FEDERAL RESERVE BANK” ( securitydept@frbank.com ) These contain a malicious attachment that installs a Trojan downloader, T-DWN.AYV (AKA “Trojan.Downloader.AYV” AKA “Banload”) DO NOT open the attachment,[...]
read moreMalicious Email: “IMPORTANT!Restrictions Applied”
We are seeing malicious emails titled: “IMPORTANT!Restrictions Applied” From: “U.S. FEDERAL RESERVE BANK” ( security@federalreservebank.org ) These contain a malicious .DOC, .DOCM, .DOCX, .PDF, .XLS, .XLSM, .XLSX, .XML or .ZIP attachment or a malicious link. DO NOT open the attachment,[...]
read moreMalicious Email: “Important Notification!”
We are seeing malicious emails titled: “Important Notification!” From: admin@federalreservebank.com UPDATED: These contain a malicious attachment that installs a Trojan downloader, T-DWN.AYV (AKA “Trojan.Downloader.AYV” AKA “Banload”) DO NOT open the attachment, instead please forward to virus.scan@systemforce.co.uk and then delete them.[...]
read moreMalicious Email: “ATTENTION! FED Wire and ACH Restrictions Applied!”
We are seeing malicious emails titled: “ATTENTION! FED Wire and ACH Restrictions Applied!” From: Federal Deposit Insurance Corporation ( admin@frb.org ) These contain a malicious attachment which contains a Trojan Downloader called W97M/Downloader.ark (ED) DO NOT open the attachment, instead[...]
read more