We see lots of phishing attempts for Bank login details. This one is actually quite effective when you get to the site. As you can see from the screenshots, it is very easy to be fooled by the http://www.halifax-online.co.uk.personal.logon.login.jsp at the start on the URL in the browser address bar ( Highlighted in Yellow) where the real web address you are sent to is lifextension.ro ( Highlighted in Green)
Many smaller screens especially on phones, tablets and small laptops will only show the first part http://www.halifax-online.co.uk with all the rest of the long phishing URL hidden off to the right hand side of the screen http://www.halifax-online.co.uk.personal.logon.login.jsp.1510638768542. lifextension.ro /RT28JASHHDAS02/Login.php?sslchannel=true&sessionid=WR3WM0KHcrFBC45ugtRa7iFomyQGXFz5fraRrou3vd4QceX3svWxy82f4JzNRFdeGOjHnwfj5iI0UJ2T
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: Halifax online <firstname.lastname@example.org>
Date: Tue 14/11/2017 06:28
Subject: We noticed an attempt to sign in to your account!
You are receiving this email because we noticed an attempt to sign in to your account from an unrecognised device. Our system has blocked this sign in attempt as a security measure.
In order to safeguard your account information we have temporarily restricted your access to certain features within our online banking system. To restore full access please click the link below to validate your account information.
Get Started ⇨
Please note: Failure to restore full access can lead to permanent suspension of access to our online banking service.
Halifax Online Banking Team
If you follow the link inside the email you first get sent to https://superjasa.com/wp-admin/js/widgets/x86x.php which immediately redirects you to http://www.halifax-online.co.uk.personal.logon.login.jsp.1510638768542.lifextension.ro/RT28JASHHDAS02/Login.php?sslchannel=true&sessionid=WR3WM0KHcrFBC45ugtRa7iFomyQGXFz5fraRrou3vd4QceX3svWxy82f4JzNRFdeGOjHnwfj5iI0UJ2T where you see a webpage looking like this:
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
Email Headers & Website details
|126.96.36.199||seout2.web-dns1.com||Saint-Quentin||New Brunswick||CA||AS36666 GloboTech Communications|
|188.8.131.52||rockland.web-dns1.com||Montreal||Quebec||CA||AS16276 OVH SAS|
|184.108.40.206||Moscow||Moscow City||RU||AS64484 JUPITER 25 LIMITED|
Received: from seout2.web-dns1.com ([220.127.116.11]:46147)
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for email@example.com; Tue, 14 Nov 2017 06:36:40 +0000
Received: from rockland.web-dns1.com ([18.104.22.168])
by se1.web-dns1.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for firstname.lastname@example.org; Tue, 14 Nov 2017 01:36:40 -0500
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
d=interclubtaekwondo.ca; s=default; h=Message-ID:Date:Subject:To:From:
Received: from [22.214.171.124] (port=56804 helo=b8td.com)
by rockland.web-dns1.com with esmtpa (Exim 4.89)
for email@example.com; Tue, 14 Nov 2017 01:36:38 -0500
Content-Type: text/html; charset=”utf-8″
From: “Halifax online” <firstname.lastname@example.org>
Subject: We noticed an attempt to sign in to your account!
Date: Tue, 14 Nov 2017 06:27:33 +0000
Authentication-Results: web-dns1.com; auth=pass email@example.com
X-SpamExperts-Outgoing-Evidence: Combined (0.84)
Both sites involved in this phish are likely to be compromised sites, being used without the website owners knowledge
There is a message on the home page for lifextension.ro warning that The hosting agreement for this page has expired! but the hosts/resellers have only put that on the home page not on any subdomains so the phish stays active
Of course the DCM software “company” is a webdesigner and hosting reseller, who aren’t taking security of their client’s sites seriously enough. By the layout and design of their own website they must think of style over substance and mistakes and errors don’t matter ( various missing & broken links, including social media buttons going nowhere.)
Has a malware prompt on its home page, luckily the file is hosted on Dropbox & no longer available for download