Red Malware key on Computer Keyboard
Home Malware “NSS CMS Invoice” Dropbox Invite Malware Email

“NSS CMS Invoice” Dropbox Invite Malware Email

by Brett M. Christensen

Outline

Email claims that “Megan” has invited you to view the file “NSS CMS Invoice 2016-07.zip” on file hosting service Dropbox.

Brief Analysis

The email is not a legitimate invoice notification and the download link does not go to Dropbox. Clicking the link downloads a .zip file that harbours a malicious JavaScript file inside. If opened, the JavaScrip file can download and install malware.

Example

CMS Invoice Malware Email

Detailed Analysis

According to this email, which purports to be from the Dropbox Team, “Megan” wants you to click a download button to view a file called “NSS CMS Invoice 2016-07.zip”. Supposedly, the file is an invoice for “Northern Support Services CMS”. The message claims that the invoice can be downloaded from the file hosting service Dropbox.

However, the email is not a legitimate invoice notification and it has no connection to Northern Support Services. Nor is the file hosted on Dropbox as claimed. Instead, the email is a criminal ruse designed to trick you into installing malware on your computer.

If you click the download button, a .zip file will be downloaded to your computer. If you then unzip the file, you will find that it contains a file called “NSS CMS Invoice 2016-07.js”.  The .js file extension means that the file is a JavaScript file. If you click this .js file, a malicious JavaScript will download and install further malware components on your computer.

The exact nature of this malware may vary. However, JavaScript is often used to install various types of ransomware.  Once installed, ransomware can lock all of the important files on your computer and then demand that you pay a fee to online criminals to receive an unlock key. Malicious JavaScript may also be used to install malware designed to steal online banking login credentials and other personal information from infected computers.

Details, such as the name of the supposed sender and the file names, may vary in different versions of these emails.

If you receive one of these emails, do not click any links or open any attachments that it contains.

Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,
Hoax-Slayer