We see lots of phishing attempts for email credentials. These scammers and phishers get ever more creative and devious in their attempts to steal your email credentials. This one is different than many others and much more devious. It pretends to be a Request for Quotation.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
Brancodi or Unitedintergroup have not been hacked or had their email or other servers compromised. They are not sending the emails to you. They are just innocent victims in exactly the same way as every recipient of these emails. ( I am certain that Brancodi don’t exist, but unitedintergroup does, however they are not any sort of import export business in the Philippines but something to do with employment, building and catering in Middle East.)
The email looks like:
From: BRANCODI IMPORT EXPORT LTD <firstname.lastname@example.org>
Date: Sun 21/05/2017 09:29
Subject: Request for Quotation
Attachment: BRANSCODI OFFERS QUOTATION_UNI17052017.htm
May i request for quotation of the following items, please check attached for your reference.
Al Azad Kalam
BRANCODI IMPORT EXPORT LTD
Manila Southwoods Sports Complex, Southwoods Ave.,
Tel / Fax: (046) 482-0120
Mobile No. 0926-8284870
|220.127.116.11||midcoast01822222.midcoast.com.au||Port Macquarie||New South Wales||AU||AS17763 AS number for Mid Nort Coast Internet,|
by knight.knighthosting.co.uk with esmtps (TLSv1.1:ECDHE-RSA-AES256-SHA:256)
for email@example.com; Sun, 21 May 2017 09:35:37 +0100
Received: from [192.168.1.8] ([18.104.22.168])
(authenticated user firstname.lastname@example.org)
by mail.wyonggolfclub.com.au (Kerio Connect 9.2.0) with ESMTPSA
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256 bits));
Sun, 21 May 2017 18:30:16 +1000
Content-Type: multipart/mixed; boundary=”===============0260749984==”
Subject: Request for Quotation
To: Recipients <email@example.com>
From: “BRANCODI IMPORT EXPORT LTD” <firstname.lastname@example.org>
Date: Sun, 21 May 2017 09:29:04 +0100
This email has an HTML attachment that when opened gives what appears to be a webpage looking like this that tells you to sign in with your email to view the document
After you input your email address and password, and press view document you get forwarded to http://www.alibaba.com/ while your details have been sent to the phisher at https://submit.jotform.us/submit/70431602253545/
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.