Home Security Beware fake Silverlight update requests

Cyber security company Proofpoint has discovered a fake Microsoft Silverlight update request that installs malware. The email campaign used to deliver the malware is highly targeted to individuals in the financial services industry.

Because it is highly targeted there are no standard “Subject lines” and the success rate is high as it uses topics of relevance to recipients. It installs a keylogger by opening an infected Microsoft Word email attachment titled info.doc but as it uses an embedded “Packager Shell Object” rather than a macro, it is not detected by anti-virus products. It then sends information typed on the computer to two Gmail accounts.

Proofpoint  suggests that users right-click on any suspect attachment and look at its properties – it will not expose a macro but it will expose a Package Shell Object or a VBScript File (.VBS).

It says cyber criminals have moved beyond the use of malicious macros and organisations will need to rethink how they prevent malicious content from reaching end users.

While many businesses are either blocking Microsoft Office macros at a policy level or educating users about the dangers of enabling macro content, attackers have other means of creating weaponised documents for distributing malware.




With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!


Popular News




Sponsored News