• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 5th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Security » Malware » “Failure in Parcel Delivery” Fake Email Drops Malware on USPS Customers’ PC

“Failure in Parcel Delivery” Fake Email Drops Malware on USPS Customers’ PC

May 19th, 2015 Waqas Malware 0 comments
“Failure in Parcel Delivery” Fake  Email Drops Malware on USPS Customers’ PC
Share on FacebookShare on Twitter

Please note that the email that appears to be sent by USPS informing that due to incorrect address the firm has failed to deliver a parcel to the recipient is actually a malicious message.

If you click on the “Shipping Label” web link present in that email, it will instantly download and install a malware on your PC.

An email that seems to be sent by the United States Postal Service/USPS claims that the recipient’s package was not delivered because of incorrect postal address. The email also instructs the recipient to print off a shipping label by clicking on a button and then take the label to any nearby USPS office so that the mistake gets rectified.

malwareTP-680x400

However, this email hasn’t been sent by USPS and the claim made in this email regarding a failed delivery is also untrue.

This email actually is another attempt of cybercriminals for deceiving users and getting an information/data stealing Trojan downloaded and installed on the user’s computer.

The URL in that fake email redirects to an infected website that when visited automatically downloads the malicious payload to the victim’s PC.

In case the victim runs the download.exe file, the Trojan instantly gets installed.

Example Email:

usps-fake-email-drops-malware-horz

Image Source: Hoax-Slayer

Generally, when installed these Trojans look for sensitive personal data from the infected computer and pass it on to the attackers who remain connected to the infected computer via remote servers. These Trojans may also download additional malicious software.

This time, cybercriminals have tried their best to make the email appear legit as it includes a genuine USPS logo, delivery barcode and shipping code.

The email is delivered as a clickable image file so that wherever the user clicks, the email redirects to the infected website containing the malware.

[src src=”source” url=”http://www.hoax-slayer.com/usps-malware.shtml”]Hoax-Slayer[/src]

  • Tags
  • Crooks
  • Email
  • Malware
  • security
  • TROJAN
  • USPS
  • virus
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Man 3D prints a wirelessly power-driven desk lamp inspired by Tesla
Next article Chinese Woman Gives Birth in Internet Cafe, keeps on surfing Web
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism.

Related Posts
Botnet found using YouTube to illegally mine cryptocurrency

Botnet found using YouTube to illegally mine cryptocurrency

Ginp Android trojan targets banking apps & threatens 2FA/SMS

Ginp Android trojan targets banking apps & threatens 2FA/SMS

How to decrypt your data from Hakbit & Jigsaw ransomware for free

How to decrypt your data from Hakbit & Jigsaw ransomware for free

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
Surveillance

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

13
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors
Cyber Attacks

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

114
Flawed Implementation of RCS Standard putting data of millions at risk
Security

Flawed Implementation of RCS Standard putting data of millions at risk

362
3 arrested, 30,000+ piracy sites shut down in global operation IOSX
News

3 arrested, 30,000+ piracy sites shut down in global operation IOSX

537

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us