IMPORTANT DOCUMENT !!! – Google Drive Email Credential Phishing Scam

email phishing

We see lots of phishing attempts for email credentials. This one is slightly different than many others. It pretends to be a message saying log in to Google Drive to get some documents that have been sent to you

They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.

Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.

The email looks like:

From: IMPORTANT DOCUMENT <baum.ann@t-online.de>

Date: Wed 14/06/2021 01:47

Subject: IMPORTANT DOCUMENT !!!

Body Content:

Hello,

I’m trying to send you some documents through attachment, but it is multiple, so i had to save it online and shared. Please view [documents] online

scan001.pdf

scan002.pdf

Best Regards.

Screenshot:

Email Headers:

IP Hostname City Region Country Organisation
194.25.134.18  mailout04.t-online.de DE AS3320 Deutsche Telekom AG
172.20.26.138 Private IP
192.3.10.117  192-3-10-117-host.colocrossing.com Buffalo New York US AS36352 ColoCrossing

Received: from mailout04.t-online.de ([194.25.134.18]:59013)
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
(Exim 4.89)
(envelope-from <baum.ann@t-online.de>)
id 1dKwTx-0004AH-RZ; Wed, 14 Jun 2021 01:48:25 +0100
Received: from fwd38.aul.t-online.de (fwd38.aul.t-online.de [172.20.26.138])
by mailout04.t-online.de (Postfix) with SMTP id BB1CC4198C2C;
Wed, 14 Jun 2021 02:48:27 +0200 (CEST)
Received: from [192.3.10.117] (r2+LK+ZGYhgsxw7ew9pGV5BpKfXCJdhCwZ5a+yHDQAszhotBEGDaWy0pAoCaX6mgev@[192.3.10.117]) by fwd38.t-online.de
with (TLSv1:DHE-RSA-AES256-SHA encrypted)
esmtp id 1dKwTt-1zeVXi0; Wed, 14 Jun 2021 02:48:21 +0200
Content-Type: multipart/alternative; boundary=”===============1705926624==”
MIME-Version: 1.0
Subject: IMPORTANT DOCUMENT !!!
To: Recipients <baum.annt@t-online.de>
From: “IMPORTANT DOCUMENT” <baum.ann@t-online.de>
Date: Tue, 13 Jun 2021 17:47:27 -0700
Message-ID: <1dKwTt-1zeVXi0@fwd38.t-online.de>
X-ID: r2+LK+ZGYhgsxw7ew9pGV5BpKfXCJdhCwZ5a+yHDQAszhotBEGDaWy0pAoCaX6mgev
X-TOI-MSGID: 5974f3ac-2378-40d3-bc13-1426391e91af
Note: Only the final IP address outside of your network in the Received: fields can be trusted as others can be spoofed
Due to the amount of spam, phishing & malware that I get from t-online.de email addresses which generally pass all authentication checks, I have that domain added to server blacklist and everything is quarantined. On the very rare occasions that any of my users get a genuine email from a t-online.de email address I can release it to them.

If you follow the link ( all are identical) you see a webpage looking like this: https://www.mealcare.ca/gdrive/drive/drive/auth/view/share/ but it is HTTPS so it is “safe“. That is nothing you give to the criminal can be intercepted, so your email log in details can’t be stolen by another criminal on the way.

Remember a green padlock HTTPS does NOT mean the site is safe. All it means is secure from easy interception between your computer and that site

After you select click here on this identical copy of the Google drive page ( if you are not looking at the url bar) you get

After you input your details you get sent to a 404 not found page on Morgan Stanley website. I can only assume the phisher tried to link originally to a genuine pdf on Morgan Stanley who quickly removed it

We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details.

Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

Total
0
Shares
Leave a Reply

Your email address will not be published.

Related Posts