Fake résumé emails attempt to spread Ordinypt Wiper
Attention German HR departments: You may want to cross off a certain "Eva Richter" from your list of employment candidates. Especially because her so-called résumé actually infects recipients with the destructive Ordinypt Wiper malware, according to a new report.
The fake résumé phishing campaign began on Sept. 11 and is specifically aimed at German-speaking employers, Bleeping Computer reported this past weekend. The campaign sends an email that appears to be a job application, replete with photo and résumé of one Eva Richter. But in reality, the photo is a random stock photo and the résumé is a PDF file that delivers Ordinypt.
Historically, Ordinypt targets Germans acts very much like a typical ransomware program. It maliciously encrypts victims’ files and demands payment via a Tor site to restore the files. However, in this instance, even if the victim pays up, the files remain useless because they are overwritten with random characters.
Ordinypt also deletes shadow volume copies and disables the Windows 10 recovery environment in an attempt to further frustrate the victim. However, in some instances of infection, the shadow volume copies survive, BleepingComputer notes.
"Dear Sirs and Madames, I hereby apply for the position offered by you at the Employment Agency," the fake email reads. "The field of activity you describe corresponds, especially to my career prospects. My application documents are attached. I would be very happy about an invitation to a personal job interview. Yours sincerely, Eva Richter."
So, if you’re looking for a job in Germany and your name coincidentally just happens to be Eva Richter, well, perhaps consider a name change until this latest phishing campaign blows over.
source scmagazineuk
Industry: Cyber Security
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project