Nickhopper 0 Posted October 4, 2018 Share Posted October 4, 2018 (edited) Why am I getting malicious e-mails from a colleague in the office with an apparent attached invoice in .doc format? they are not being picked up by the Eset mail protection. Can I stop them in any way? Nick Edited October 4, 2018 by Nickhopper Link to comment Share on other sites More sharing options...
Administrators Marcos 5,257 Posted October 4, 2018 Administrators Share Posted October 4, 2018 Please submit the suspicious attachment (ideally the whole email in the eml or msg format) to samples@eset.com in an archive protected with the password "infected". If it's a new macro malware, using ESET Dynamic Threat Defense would likely improve the response and you'd get it detected quicker without waiting for the next engine module update. Link to comment Share on other sites More sharing options...
Most Valued Members Nightowl 206 Posted October 7, 2018 Most Valued Members Share Posted October 7, 2018 On 10/4/2018 at 7:00 PM, Nickhopper said: Why am I getting malicious e-mails from a colleague in the office with an apparent attached invoice in .doc format? they are not being picked up by the Eset mail protection. Can I stop them in any way? Nick How did you know that these doc files are infected? , what made you think that they are infected? Link to comment Share on other sites More sharing options...
nadhim 0 Posted October 23, 2018 Share Posted October 23, 2018 So with help of Google, I managed to write 22 lines of code that sends an email with the username and password that were entered on my fake website. After that, it sends the user that visited the fake website to the real Dropbox site. And if there was still a Dropbox cookie on your computer, you are logged in on Dropbox, so you won’t notice anything. Link to comment Share on other sites More sharing options...
Most Valued Members Nightowl 206 Posted October 23, 2018 Most Valued Members Share Posted October 23, 2018 (edited) 6 hours ago, nadhim said: So with help of Google, I managed to write 22 lines of code that sends an email with the username and password that were entered on my fake website. After that, it sends the user that visited the fake website to the real Dropbox site. And if there was still a Dropbox cookie on your computer, you are logged in on Dropbox, so you won’t notice anything. So what you have done is a Phishing site to steal information about Dropbox on your fake website. What are you trying to report or tell? It's also off-topic what you have just posted , you should have made a new topic about this, because the topic is about Malicious files in email. Edited October 23, 2018 by Rami Link to comment Share on other sites More sharing options...
ISHOULI 0 Posted December 3, 2018 Share Posted December 3, 2018 (edited) On 10/4/2018 at 5:06 PM, Marcos said: Please submit the suspicious attachment (ideally the whole email in the eml or msg format) to samples@eset.com in an archive protected with the password "infected". If it's a new macro malware, Torrent TurboTax Gogoanime using ESET Dynamic Threat Defense would likely improve the response and you'd get it detected quicker without waiting for the next engine module update. the user that visited the fake website to the real Dropbox site. And if there was still a Dropbox cookie on your computer, you are logged in on Dropbox, so you won’t notice anything Edited December 3, 2018 by ISHOULI Link to comment Share on other sites More sharing options...
Recommended Posts