Home Phishing 'I Forward this File to You for Review' Phishing Email

'I Forward this File to You for Review' Phishing Email

Posted: August 30, 2011

'I forward this file to you for review. Please open and view it' is a spam email that's used to spread Poison Ivy backdoor Trojans in the form of file attachments. Although these file attachments look like Excel files, SpywareRemove.com malware researchers have analyzed these attachments and found that they're concealing their true file type, which is that of a Flash file. 'I forward this file to you for review' messages can be easily recognized by their subject header, '2011 Recruitment Plan,' their file attachment, '2011 Recruitment Plan.xls,' and, of course, by the main body's message, which is the same as the name of the spam email scam itself.
 
Awareness of the fraudulent nature of 'I forward this file to you for review' email messages can be particularly vital because 'I forward this file to you for review. Please open and view it' messages will spoof their 'From' field to make it look as though they were sent by the Beyond.com career database website. However, SpywareRemove.com malware research team has found that the actual Beyond.com site is completely unrelated to this Trojan-distributing scam and can be considered trustworthy.
 

After You Place Your Trust in This Tainted Message

'I forward this file to you for review' spam message has, so far, confined themselves to Poison Ivy backdoor attacks. However, this attack is, by itself, sufficiently flexible and dangerous to be considered a serious security breach for any PC. SpywareRemove.com malware research team cautions anyone who's opened a 'I forward this file to you for review' file to be aware of the following attack possibilities:

  • Infection of your computer's natural system files. Trojans typically will infect normal Windows files and processes instead of creating their own program files. This allows Poison Ivy backdoor attacks to ignore a variety of security features and launch themselves whenever Windows starts.
  • Criminal access to your PC. Criminals can use Trojans to control your computer, steal information, delete files, change system settings or force your PC to commit crimes (such as DDoS attacks).
  • The installation of other forms of malicious software. Trojans are able to download and install many different PC threats, such as keyloggers, worms and viruses.

Backdoor Trojans (such as Backdoor.Win32.Ruskill.gd, Backdoor.win32.scrab.p, Backdoor.Win32.DsBot.bvp or Backdoor.Ciadoor!rem) may show no visible symptoms of infecting your PC, SpywareRemove.com malware researchers recommend that you use malware software to find and remove Poison Ivy backdoor and similar types of Trojans.

Malware Automatic Detection Tool (Recommended)

Is your PC infected with malware caused by the 'I Forward this File to You for Review' phishing email? To safely & quickly detect malware, we highly recommend you...

Loading...