Malware Campaign Morphs

Last month, a major malware campaign attempting to trick users into opening malicious PDF files was <a href="http://www.computerworld.com/s/article/9176088/Major_malware_campaign_abuses_unfixed_PDF_flaw?taxonomyId=208">reported</a>. The attack worked by sending a malicious e-mail masquerading as mail from company system administrators and contained the subject message heading "setting for your mailbox are changed." The malware exploited an unpatched design flaw in the PDF format.

Last month, a major malware campaign attempting to trick users into opening malicious PDF files was reported. The attack worked by sending a malicious e-mail masquerading as mail from company system administrators and contained the subject message heading "setting for your mailbox are changed." The malware exploited an unpatched design flaw in the PDF format.

But it seems this particular attack is morphing.

Companies have been writing into the SANS Institute reporting that they are receiving these e-mails, but they don't include a PDF attachment. Instead they contain a link to a website, which prompts them to install malware. It appears you now have to be careful of both the PDF and the link. The attack is getting more crafty.

As a general rule of thumb, I don't ever open up PDFs in e-mail or click on links. If I get something from a colleague, I always ask for confirmation of the item's authenticity. It adds a little extra work on to the back end, but it helps ensure I don't click on something I might later regret. If you've seen these e-mails roll through your company, share in the comments field.

Adam Ross is managing editor at the SANS Institute and wrote, edited, and Web produced for The Washington Post's opinions and politics sections, online and in print. You can reach him at aross@nextgov.com.