• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Malware » Phishing Email Scam Delivers Subpoena and Malware

Phishing Email Scam Delivers Subpoena and Malware

2019-11-07 by Michelle Dvorak

Phishing Email Malware Subponea

Phishing Email Scam Delivers UK Ministry of Justice Subpoenas and Predator the Thief Malware Malware

Cybersecurity researchers at COFENSE report a new phishing email campaign that infects victims with malware. The phishing emails are designed to trick the recipient into thinking they originate from the UK Ministry of Justice as official court emails. The phishing email sends a fake court subpoena to targets, but if the recipient clicks on the link in the email it directs them to a malware downloader that infects the devices with Predator the Thief malware. So far insurance industry and retail companies are the targets of this phishing campaign.

Predator the Thief is a publicly available malware that steals information from infected devices. This malware infects devices and attempts to steal sensitive data.

The phishing email states that the recipient has been subpoenaed by the UK Ministry of Justice. The victim is instructed to click on a link to view the subpoena, scaring them into thinking they have only fourteen days to read and respond to it. The link sends the victim to a Google Docs file which contains another link to a Microsoft OneDrive file. The MS Word document is a malicious Microsoft Word file with macros that downloads Predator the Thief malware to the victim’s device.

UK Ministry of Justice Subpoena Phishing Scam Screenshot
COFENSE Image: UK Ministry of Justice Subpoena Phishing Scam Screenshot

What is Malware?

Malware is any kind of unwanted software or app that infects a computer, laptop, phone, router, or hardware. Malwares attempt to steal information or money from infected device. They may also be used to spy on a device or infect other hardware. Malware attacks are frequently launched with phishing email campaigns or social engineering.

Hacked sensitive information may include usernames and passwords for email or financial accounts logins. Malware often steals admin privilege and credentials to gain higher access to the infected device or network. The malware may also steal information about the device or the network it is connected to and the credentials in subsequent malware attacks.

What is Predator the Thief Malware?

Predator the Thief malware is a type of malware known as an info stealer. This type of malware steals information from an infected device. Predator the Thief hacks cryptocurrency wallets, browser information, FTP connections, and email credentials. It can also take a screenshot of the infected machine. Predator the Thief sends device and user fingerprint data back to the hacker.

What is a Phishing Email?

A phishing email is any kind of malicious email that attempts to trick the recipient into downloading a malicious file, clicking on a link that leads to as spoofed or malicious website, or attempts to gather sensitive information like credit card numbers from the recipient. Phishing emails are disguised to look like official or familiar emails that the victim may recognize like those that come from their banks, coworkers, or places that they shop. Some of them are very well crafted but usually recipients can detect a phishing email by spelling mistakes and other errors that give the fake email away.

Phishing emails steal money or sensitive data from targets. Phishing emails may be sent to hundreds if not thousands of email addresses in hopes that some percentage of people will be fooled into clicking on a link or giving up personal information that leads to identity or credential theft. When a phishing email is targeted at an individual, it is referred to as a spear phishing email

Phishing Email What to Do

The UK Ministry of Justice phishing email is especially dangerous because it contains a link that leads to a trusted source (Google Docs). This in turn leads to another trusted source (Microsoft One Drive). This allows this type of phishing email scam to bypass spam filters.

  • Disable Microsoft macros by default
  • Do not click on links in emails from people you don’t know
  • Official subpoenas are not delivered by the courts through emails

How to Report Phishing Scmas

  • If you receive a phishing email, forward it to the FTC at spam @ uce.gov and to the Anti-Phishing Working Group at reportphishin g@ apwg.org. If you got a phishing text message, forward it to FTC SPAM (7726)
  • Report the phishing attack to the FTC at ftc.gov/complaint

Filed Under: Malware

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version