A rather well done phishing scam dropped in my inbox this morning. The email comes from what is alleged to be an online e-commerce site, saying your order has been shipped, follow the link to view the order details. The domain sending these does exist and the sending service is listed as the correct MX & service for the domain, although DNS lookups do show a different set of IPs for the server. ( This isn’t unusual with Godaddy and many other large domain & webhosting providers hosted email services)
This domain holly-wilson.com has been around for a while, so I am guessing the web hosting account has been compromised. There is a custom 404 page on the home page.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: Holly Wilson <email@example.com>
Date: Thu 18/04/2019 04:32
Subject: Shipped Item/s: Attached Via DHL : ORDER LD-58614060
We are happy to announce to you that the following items you ordered has been shipped from our
View your Order (order information available here);
Order number: LD-58614060
Order Date: 16/04/2019
Shipped Item/s: Attached
Your order was shipped to you via DHL; use the tracking number(s) on the attached order information
above. Please note that it may take 24 to 48 hours for shipment tracking information to become available.
So if you don’t see it right away, don’t worry – just check back in a little while.
(If this email does not list all the items in your order, your credit card will be billed for the remaining items
when they are shipped.)
Thank you for your purchase!
If you follow the link you are redirected via a short url service https://bit.ly/2Z9jYMu to a webpage looking like this: http://bigbirdfries.info/Ston/index.php?unionmars=jupitortea telling you the PDF is password protected, log in with your email address to unlock it
Press OK & you get a fake Adobe log in page
After you input your email address and password, you get told incorrect details and try again continually.
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
|126.96.36.199||out.west.exch084.serverdata.net||Chesapeake||Virginia||US||AS16406 Intermedia.net, Inc.|
Received: from out.west.exch084.serverdata.net ([188.8.131.52]:43989) by my email server with esmtps (TLSv1.2:ECDHE-RSA-AES256-SHA384:256) (Exim 4.91) (envelope-from <firstname.lastname@example.org>) id 1hGxmR-00040n-G6 for email@example.com; Thu, 18 Apr 2019 04:32:07 +0100 Received: from MBX084-W1-CA-4.exch084.serverpod.net (10.254.135.131) by MBX084-W1-CA-4.exch084.serverpod.net (10.254.135.131) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 17 Apr 2019 20:32:04 -0700 Received: from MBX084-W1-CA-4.exch084.serverpod.net ([10.254.135.131]) by MBX084-W1-CA-4.exch084.serverpod.net ([10.254.135.131]) with mapi id 15.00.1473.003; Wed, 17 Apr 2019 20:32:04 -0700 From: Holly Wilson <firstname.lastname@example.org> Subject: Shipped Item/s: Attached Via DHL : ORDER LD-58614060 Thread-Topic: Shipped Item/s: Attached Via DHL : ORDER LD-58614060 Thread-Index: AdT1l0rPRiFkHNIOQkC4AC8Akd6OUg== Date: Thu, 18 Apr 2019 03:32:04 +0000 Message-ID: <a8879a8575a743459c861fc851899570@MBX084-W1-CA-4.exch084.serverpod.net> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [184.108.40.206] Content-Type: multipart/alternative; boundary="_000_a8879a8575a743459c861fc851899570MBX084W1CA4exch084serve_" MIME-Version: 1.0