We see lots of phishing attempts for email credentials. This one is slightly different than many others. It pretends to be a message from Alibaba to login & view a company order. It is quite an amateurish looking attempt but it will catch out the unwary.
I have received over a dozen of these in the last few minutes.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
These do not come from Alibaba and are coming form what appears to be either a compromised or fraudulently set up account on an Australian server
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: Alibaba.com <firstname.lastname@example.org>
Date: Fri 16/03/2018 09:27
Subject: Alibaba.com/Contact MOQ
Alibaba.com: Company Order
You Have (2) Important Alibaba.com Companies Quotation.(email@example.com ).
Login via our SSL secured website, To view sample order from companies interested in buying your product
View Sample Order
Copyright Â© 1999-2017 Alibaba.com. All rights reserved.
All Rights Reserved.
This message is auto-generated from E-mail security server, and replies sent to this email can not be delivered.
This email is meant for: firstname.lastname@example.org
If you follow the link in the email you go to a compromised/hacked site http://www.enabledlondon.com/del-content/Roundcube.email@example.com
After you inset an email address & password, you get redirected to another log in page http://webmail.speedy.com.pk/ which might be connected or might be another innocent victim that has been chosen at random who just happens to use a Roundcube log in page.
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
|126.96.36.199||Melbourne||Victoria||AU||AS55449 AUSWEB.com.au Pty Ltd|
Received: from [188.8.131.52] (port=49447 helo=zeus.ausweb.com.au)
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for firstname.lastname@example.org; Fri, 16 Mar 2018 09:27:32 +0000
Received: from servers by zeus.ausweb.com.au with local (Exim 4.89_1)
for email@example.com; Fri, 16 Mar 2018 20:27:28 +1100
X-PHP-Script: www.servers.ausweb.com.au/Mailer.php for 184.108.40.206
Date: Fri, 16 Mar 2018 09:27:28 +0000
From: =?UTF-8?Q?Alibaba=2ecom?= <firstname.lastname@example.org>
Content-Type: text/html; charset=”us-ascii”
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname – zeus.ausweb.com.au
X-AntiAbuse: Original Domain – myonlinesecurity.co.uk
X-AntiAbuse: Originator/Caller UID/GID – [533 501] / [47 12] X-AntiAbuse: Sender Address Domain – zeus.ausweb.com.au
X-Get-Message-Sender-Via: zeus.ausweb.com.au: authenticated_id: servers/only user confirmed/virtual account not confirmed
X-Authenticated-Sender: zeus.ausweb.com.au: servers
X-Source-Args: /usr/bin/php /home/servers/public_html/Mailer.php