“Your shipment has arrived” email hides remote access software
嗯,用户让我帮忙总结这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章内容,理解其主要信息。 文章讲的是一个伪装成DHL的钓鱼邮件,里面有一个附件,点击后会下载一个远程访问工具。这个工具被用来进行网络探索、数据窃取和投放恶意软件。攻击者利用了合法的组件来欺骗目标运行远程访问工具。 接下来,我需要提取关键点:伪装的DHL邮件、附件中的远程访问工具、攻击目的(网络探索、数据窃取、投放恶意软件)、以及攻击手法(利用合法组件)。 然后,我要把这些信息浓缩到一百个字以内。可能的结构是:描述攻击手段、使用的工具、以及带来的后果。 最后,检查语言是否简洁明了,没有使用开头的套话,并确保所有关键点都被涵盖。 </think> 一封伪装成DHL的钓鱼邮件附带了一个PDF附件,点击后下载并安装了一个远程访问工具SimpleHelp。该工具允许攻击者控制目标系统、窃取数据并传播恶意软件。 2026-4-17 07:40:3 Author: www.malwarebytes.com(查看原文) 阅读量:11 收藏

An attachment in an email impersonating DHL about a shipment contains a link to a preconfigured SimpleHelp remote access tool—an ideal starting point for attackers to explore a network, steal data, and drop additional malware.

A German industrial spare parts and equipment supplier received an email pretending to be from DHL, claiming a shipment had arrived.

Screenshot of email pretending to be from DHL

Given their line of business, I imagine they get this type of email all the time. But a few details stood out:

  • The sender’s email address did not belong to DHL,
  • the receiver address was the general info@ for the company,
  • the images in the email were hosted on ecp.yusercontent.com,  
  • and, most importantly, there was attachment.

While the remote content is hosted on a legitimate Yahoo webpage commonly used to serve images and other content in Yahoo Mail, this is not something DHL typically uses.

The attachment, a PDF file called AWB-Doc0921.pdf is just a blurred image with a Microsoft-branded button that prompts the victim to “Continue” to access a secure file.

blurred content with a Continue button

In reality, clicking the button downloads a file called AWB-Doc0921.scr from the domain longhungphatlogistics[.]vn, a domain belonging to a Vietnamese logistics company that was likely compromised to host malware.

Malwarebytes blocks longhungphatlogistics[.]vn
Malwarebytes blocks longhungphatlogistics[.]vn

A .scr file is a Windows file, which is an executable (.exe) file used to launch screensavers. They are often used to hide malicious code because Windows trusts them, allowing them to bypass some security layers. 

In this case, the file is a modified installer of a remote access tool signed by SimpleHelp.

UAC prompt for the signed installer
UAC prompt for the signed installer

SimpleHelp is a remote support and remote monitoring and management (RMM) platform. It allows remote desktop control, file transfer, diagnostics, and unattended access. In the wrong hands, that’s effectively a support-style backdoor. Attackers can use it for reconnaissance, credential theft, lateral movement, defense evasion, and staging further malware, including ransomware. We’ve seen SimpleHelp abused in this way before.

This is basically a beaconing model. Once installed, the system connects out to the attacker’s server, which is more likely to be allowed through NAT and firewalls than inbound connections. Because the user initiated the install, the attacker gets immediate visibility of the system and can reconnect later whenever the service is running. In the case of a phish, that means the lure only has to get the victim to execute the file once. After that, the attacker’s console can show the new machine as a manageable asset.

For what seems to be a non-targeted attack, the campaign shows a decent level of sophistication by using legitimate components to trick targets into running the remote access tool.

How to stay safe

The good news: once you know what to look for, these attacks are much easier to spot and block. The bad news: they’re cheap, scalable, and will continue to circulate.

So, the next time a “PDF” prompts you to download a file, pause to think about what might be hiding under the hood.

Beyond avoiding unsolicited attachments, here are a few ways to stay safe:

  • Only access your accounts through official apps or by typing the official website directly into your browser.
  • Check file extensions carefully. Even if a file installs a legitimate tool, it may not be safe to run it.
  • Enable multi-factor authentication for your critical accounts.
  • Use an up-to-date, real-time anti-malware solution with a web protection module.

Pro tip: Malwarebytes Scam Guard recognized this email as a scam.


Something feel off? Check it before you click.  

Malwarebytes Scam Guard helps you analyze suspicious links, texts, and screenshots instantly.  

Available with Malwarebytes Premium Security for all your devices, and in the Malwarebytes app for iOS and Android.  

Try it free → 

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/your-shipment-has-arrived-email-hides-remote-access-software
如有侵权请联系:admin#unsafe.sh