A very good carefully targeted Phishing attempt
We see lots of phishing attempts for email credentials. This one is slightly different than many others and is one of the best phishing scams I have ever seen. It pretends to be an email asking you to download some documents relating to a project via a sharefile attachment.
It involves a compromised email account belonging to a building, consultancy and ecology company, sending the phishing emails through the genuine company’s mail server. It was sent to a recipient who is involved in the ecology business and would often get emails like this one to download documents from a company. The only warning signs are the url of the phishing site and that could easily be mistaken for genuine if you didn’t go up the chain to the base web address.
I honestly don’t know if this was carefully targeted at the recipient or whether he was just one of hundreds or thousands of victims and it was just a total coincidence that an ecology company received the email.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: claire.wilmer <claire.wilmer@wyg.com>
Date: Wed 11/04/2018 12:04
Subject: FYI – Important
Body content:
FYI, See below.
ShareFile Attachments Title Size WYG | Global Consultancy-Project-Approval.pdf 1.7 MB
Review Document Claire Wilmer ShareFile to share documents securely. Learn More.
Claire Wilmer
Director of EcologyWYG
11th Floor, 1 Angel Court, London, EC2R 7HJ
Tel: +44 207 250 7553
Mob: +44 7968 561 788
WYG Environment Planning Transport Limited. Registered in England number: 3050297.
Registered Office: Arndale Court, Otley Road, Headingley, Leeds, West Yorkshire LS6 2UJ. VAT No: 473-2380-49.This message contains confidential information and is intended only for the recipient. If you are not the recipient you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message, which arise as a result of e-mail transmission. If verification is required please request a hard-copy version.
Screenshot:
If you follow the link in the email : https://axaritowers.com/wp-content/upgrade/Office365-K/Microsoftdocs/
After you input your email address and password, you get told incorrect details and forwarded to an identical page where you can put it in again.
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
Email Headers:
IP | Hostname | City | Region | Country | Organisation |
---|---|---|---|---|---|
195.92.225.82 | mail.wyg.com | GB | AS2529 Now maintained by Cable & Wireless Worldwide | ||
10.11.1.31 | Private IP | ||||
fe80::64ca:20b7:e254:1bc7 |
Received: from support.wyg.com ([195.92.225.82]:10213 helo=mail.wyg.com)
by my mail server with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
(Exim 4.89_1)
(envelope-from <claire.wilmer@wyg.com>)
id 1f6DXY-0002XB-Fx
for daniel@victimsdomain.com; Wed, 11 Apr 2018 12:03:48 +0100
Received: from LDS-EX-2K8-002.wyg.com (Not Verified[10.11.1.31]) by mail.wyg.com with Trustwave SEG (v7,5,8,10121) (using TLS: TLSv1, AES256-SHA)
id <B5acdeb920000>; Wed, 11 Apr 2018 12:03:47 +0100
Received: from LDS-EX-2K8-001.wyg.com ([fe80::64ca:20b7:e254:1bc7]) by
LDS-EX-2K8-002.wyg.com ([fe80::ad28:7ee3:a152:78fe%16]) with mapi id
14.03.0361.001; Wed, 11 Apr 2018 12:03:47 +0100
From: claire.wilmer <claire.wilmer@wyg.com>
Subject: FYI – Important
Thread-Topic: FYI – Important
Thread-Index: AdPRhKrHAzVnpSCZSe+F6XR4Xb1fjQ==
Date: Wed, 11 Apr 2018 11:03:46 +0000
Message-ID: <A03A949DF2095D44AA191DA9D49F408C86E11160@LDS-EX-2K8-001.wyg.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.11.6.1]
Content-Type: multipart/related;
boundary=”_008_A03A949DF2095D44AA191DA9D49F408C86E11160LDSEX2K8001wygc_”;
type=”multipart/alternative”
MIME-Version: 1.0
Contents
–_008_A03A949DF2095D44AA191DA9D49F408C86E11160LDSEX2K8001wygc_
Content-Type: multipart/alternative;
Check the dates on the folders. These have been there for a while now.
Office365-K/ 2018-02-12 04:51
Microsoftdocs/ 2017-08-14 04:08