Solved

Recieved attack email from my mum, how did this happen?

Posted on 2013-06-07
2
423 Views
Last Modified: 2013-06-12
I received a link in an email from my mother, who can barely use a computer, that linked me  to an attack site :-

http://www.pimy(dot)ms/fmueze/yjhvykyagy.php   (Avast caught it as an attack site )

http://www.pimy.ms/ is now safe and links to a management school that was hacked
(see https://www.zone-h.org/mirror/id/19228451)


How compromised is my mums system, what has happened here? Are they just harvesting valid e-mail addresses with the obviously randomly generated file name?
0
Comment
Question by:GwynforWeb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Assisted Solution

by:BillBondo
BillBondo earned 100 total points
ID: 39229372
Wonder if your mom clicked on that link which probably opened her address book and sent on her behalf???
0
 
LVL 9

Accepted Solution

by:
BigPapaGotti earned 400 total points
ID: 39229420
Sounds to me like she was attacked via an ad or a URL redirect and then the malicious program was installed on her machine and then used her e-mail account to send out to everyone in her address book/recently contacted list to hopefully spread the infection further. I would definitely have her scan her computer with Malwarebytes and remove anything it finds, then reboot and update and scan again to ensure it is clean.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This Micro Tutorial will demonstrate how to add subdomains to your content reports. This can be very importing in having a site with multiple subdomains.
Shows how to create a shortcut to site-search Experts Exchange using Google in the Chrome browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch the Search Engine Menu: In chrome, via you…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question