?
Solved

Recieved attack email from my mum, how did this happen?

Posted on 2013-06-07
2
Medium Priority
?
427 Views
Last Modified: 2013-06-12
I received a link in an email from my mother, who can barely use a computer, that linked me  to an attack site :-

http://www.pimy(dot)ms/fmueze/yjhvykyagy.php   (Avast caught it as an attack site )

http://www.pimy.ms/ is now safe and links to a management school that was hacked
(see https://www.zone-h.org/mirror/id/19228451)


How compromised is my mums system, what has happened here? Are they just harvesting valid e-mail addresses with the obviously randomly generated file name?
0
Comment
Question by:GwynforWeb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Assisted Solution

by:BillBondo
BillBondo earned 400 total points
ID: 39229372
Wonder if your mom clicked on that link which probably opened her address book and sent on her behalf???
0
 
LVL 9

Accepted Solution

by:
BigPapaGotti earned 1600 total points
ID: 39229420
Sounds to me like she was attacked via an ad or a URL redirect and then the malicious program was installed on her machine and then used her e-mail account to send out to everyone in her address book/recently contacted list to hopefully spread the infection further. I would definitely have her scan her computer with Malwarebytes and remove anything it finds, then reboot and update and scan again to ensure it is clean.
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
This Micro Tutorial will demonstrate how to add subdomains to your content reports. This can be very importing in having a site with multiple subdomains.
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question