System Message:

Australian Immigration Daily News

Breaking Australian immigration news brought to you by Migration Alliance and associated bloggers. Please email help@migrationalliance.com.au

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Posted by on in General
  • Font size: Larger Smaller
  • Hits: 3828
  • 0 Comments

Beware of emails with resumes / CVs attached

Beware of resume emails bearing ransomware: Alert Priority High

Staysmartonline.gov.au have released information today which could affect migration agents, as people seeking to migrate to Australia will often send their CV / resume by email asking for an eligibility assessment.

You are advised to be wary of unsolicited emails purporting to attach resumes from potential job candidates. Malicious individuals are using these emails to deliver the CryptoWall 3.0 ransomware that can encrypt your files and require you to submit payment for the key to decrypt them.

The malicious emails come from a variety of addresses, including
dustywarner[at]csi.com, MargaritoEverett[at]ebparks.org and SantiagoHenson[at]tom.com.

The email subject is typically ‘[first and last names of purported sender] – My resume’.

The email body generally reads:  ‘Hi, my name is [first and last names of purported sender]. I am herewith submitting my Resume under attachment for your perusal.

‘Thank you, [first name of purported sender here].

Attachment: [first and last names of purported sender] – My Resume.zip.’ 

A screenshot of a sample email is attached below.

 

The attachment is a .zip file which includes a single file named [first and last names of purported sender] MyResume.js. If a recipient of this email clicks on the .js file (JavaScript file), the file attempts to reach out to a list of servers and download .jpg files containing malicious executables that try to install the CryptoWall 3.0 ransomware.        

The attack appears to be targeting Australian companies and researchers indicate a new campaign may have been released on Tuesday last week.

When a user’s computer is infected with CryptoWall, the ransomware encrypts a range of file types with a strong encryption key. CryptoWall then typically displays a page to the user advising them their files have been encrypted and that they need to pay a ransom for the key to decrypt them. The message may also include a link to a website to make payment. 

It is important to note that for many victims, paying the ransom may lead to files being returned to normal. However, because you are dealing with criminals, you should be aware this is extortion and there are no guarantees you will regain access to your data. 

The criminals may not respond, they may increase their demands or they may attack you again. Unless you take preventative action, your computer will still have the same vulnerability that caused it to become infected in the first instance.

Staying safe 

Prevention is the best antidote to ransomware and other malware attacks.

Use spam filters and be cautious when opening emails, especially if there are attachments.

Make sure you are using a reputable security product.

Make sure it is up-to-date and switched on.

Make sure your operating system and applications are up-to-date.

Run a full scan of your computer—regularly.

Set and use strong and unique passwords.

Set passwords on all your hardware devices (modems and routers).                

Back up your data.

Keep a backup copy of your data in a safe place, disconnected from your computer and the internet.

Only visit reputable websites and online services.

Most up-to-date security software should identify and block ransomware. 

Recovery

The major problem with encryption based ransomware is that once your computer has become infected, the only way to recover your files is from a clean backup (if the backup has not also been encrypted) or by receiving the encryption key from the scammers.

If you have a clean back up of your data, you can use this to restore your files once you have re-established your system, free of infection.

You can also keep a copy of the encrypted files in case future events make decryption possible. Authorities may take down these ransomware gangs in the future and it might become possible to obtain the encryption key for your data.

Last modified on
Rate this blog entry:
2

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Sunday, 22 June 2025
Joomla SEF URLs by Artio