We see lots of phishing attempts for email credentials. This is the 2nd one this morning using the same domain extranenet.com. At first this particular phishing email looked like a typical malware download email. I wonder how many more phishing scams we will find on this site today before we can persuade the hosts to take it down.
The same alert applies on this one .A very large number of companies do use an EXTRANET so this typo squatting domain, could very easy be seen as the company extranet and be persuaded to enter details.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: Kim Ma <firstname.lastname@example.org>
Date: Fri 06/10/2017 03:30
Subject: Fw: Request for quote
See attached for our revised PO, your urgent respond is awaited.
Need this by Tomorrow.
MAISHA INTERNATIONAL TRADING CO.,LTD.
ADD:ROOM 1101，XINYUHE BUSINESS BUILDING,
NO. 170,HAIER ROAD, LAOSHANDISTRICT,QINGDAO,266061，CHINA
SKYPE : qdmaisha
1 Attachment | quotation.pdf | Download as pdf
Following the link http://email@example.com takes you to a page looking like this with a blurry image of what looks like an invoice or order quote and the requirement for you to log in
After inserting details, you are then forwarded to a genuine innocent site where you can read or download a pdf document https://www.docdroid.net/wPKGl2j/intro-text-2017.pdf#n=1252899642&fid=1&fav=1
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
|188.8.131.52||mx12-out4.antispamcloud.com||DE||AS28753 Leaseweb Deutschland GmbH|
|184.108.40.206||mrelay-300.small-dns.com||Kepong||MY||AS45352 IPSERVERONE – IP Maintainer|
|220.127.116.11||mail.x1r.com.my||Ipoh||Perak||MY||AS45352 IPSERVERONE – IP Maintainer|
|18.104.22.168||TR||AS44558 Nethouse Bilgi Islem Merkezi Ltd|
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for firstname.lastname@example.org; Fri, 06 Oct 2017 06:10:05 +0100
Received: from mrelay-300.small-dns.com ([22.214.171.124])
by mx19.antispamcloud.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for email@example.com; Fri, 06 Oct 2017 07:10:03 +0200
Received: from mail.x1r.com.my ([126.96.36.199])
by mrelay-300.small-dns.com with esmtps (TLSv1:DHE-RSA-AES256-SHA:256)
for firstname.lastname@example.org; Fri, 06 Oct 2017 13:09:57 +0800
Received: from [188.8.131.52] (helo=quadraplace.ro)
by mail.x1r.com.my with esmtpa (Exim 4.77)
for email@example.com; Fri, 06 Oct 2017 10:29:49 +0800
From: Kim Ma<firstname.lastname@example.org>
Subject: Fw: Request for quote
Date: 06 Oct 2017 05:29:39 +0300
Authentication-Results: antispamcloud.com; auth=pass (login) email@example.com
X-SpamExperts-Outgoing-Evidence: Combined (0.15)