{"id":262344,"date":"2010-02-01T20:56:11","date_gmt":"2010-02-02T01:56:11","guid":{"rendered":"http:\/\/www.szone.us\/f85\/malicious-web-site-malicious-code-malicious-google-job-application-response-38872\/"},"modified":"2010-02-01T20:56:11","modified_gmt":"2010-02-02T01:56:11","slug":"malicious-web-site-malicious-code-malicious-google-job-application-response","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/262344","title":{"rendered":"Malicious Web Site \/ Malicious Code: Malicious Google Job Application Response"},"content":{"rendered":"<div>Sat, 30 Dec 1899 12:00:00 AM GMT<\/p>\n<p>Websense Security Labs? ThreatSeeker? Network has discovered a new malicious spam campaign that spoofs Google job application responses. The messages look very well written and are so believable that they are probably scrapes from actual Google job application responses. Typically, spam has grammatical errors or spelling mistakes that make the messages obviously unofficial and act as red flags. The text of these messages, however, has no such mistakes, making them much more believable&#8211;especially if the target really has applied for a job with Google. <\/p>\n<p>The <b>From:<\/b> address is even spoofed to fool victims into believing the message was sent by Google. The messages have an attached file called CV-20100120-112.zip that contains a malicious payload. This is where the message gets suspicious, because the contents of the .zip file have a double extension ending with .exe. The attackers attempt to hide the .exe extension by preceding it with .html or .pdf, followed by a number of spaces and then the .exe extension. The .exe file (SHA1:80366cde71b84606ce8ecf62b5bd2e459c54942e) has <a href=\"http:\/\/www.virustotal.com\/analisis\/d5fd8e098054a5f1b570de5d31241c1428a79fb25ec6a477261f6efaaf3d7440-1265043648\" >little AV<\/a> coverage at the moment. <\/p>\n<p><img decoding=\"async\" src=\"http:\/\/securitylabs.websense.com\/content\/Assets\/AlertMedia\/MalGoogMessage.png\" border=\"0\" alt=\"\" \/> <\/p>\n<p>Websense Messaging and Websense Web Security customers are protected against this attack. <\/p>\n<p><a href=\"http:\/\/securitylabs.websense.com\/content\/Alerts\/3543.aspx\" >http:\/\/securitylabs.websense.com\/con&#8230;erts\/3543.aspx<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sat, 30 Dec 1899 12:00:00 AM GMT Websense Security Labs? ThreatSeeker? Network has discovered a new malicious spam campaign that spoofs Google job application responses. The messages look very well written and are so believable that they are probably scrapes from actual Google job application responses. Typically, spam has grammatical errors or spelling mistakes that [&hellip;]<\/p>\n","protected":false},"author":4744,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-262344","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/262344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/4744"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=262344"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/262344\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=262344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=262344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=262344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}