Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit.
The email looks pretty legitimate (click on the screenshot to enlarge it):
“All links in the email body, apart from the linked email address, lead users to the same HTML page that are hosted on various legitimate but compromised WordPress domains,” GFI’s Jovi Umawing warns, and adds that the links are most likely to be changed from time to time.
Blackhole then checks for the presence of Adobe Reader and Adobe Flash on the user’s system, and finally deploys two exploits that target a Adobe Flash Player, Adobe Reader and Acrobat vulnerability and a Microsoft Windows Help and Support Center vulnerability to take control of the user’s system and download malware on it.
As always, users are reminded to keep their software updated, as the exploits used by various exploit kits do not work on the latest versions.