At first I thought this was going to be the start of today’s malware runs, but it is only a phishing attempt against a wide ranging number of common email services. Of course this is still very serious, but you do at least have the opportunity to stop entering any information and it won’t automatically infect you.
We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated. It pretends to be a message from a timber company to read your invoice, document or bill on dropbox
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
Looking at the email headers, I cannot determine if Howarth-Timber.co.uk have been compromised and are sending these. They come via outlook.com. It looks very possible that somebody has managed to obtain the username & password to Howarth-Timber.co.uk outlook.com email account and are then sending these phishing emails. Or they have set up an outlook account in the name of Howarth Timber to perform this phish.
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: 40 Duncan Barker <DBarker@Howarth-Timber.co.uk>
Date: Tue 11/04/2017 09:09
See the attached document uploaded on dropbox and let me know if you need anything.
Duncan Barker| Group Buyer
T: 03301192435| M: 07974 402821
Group Buying, 29 Doncaster Road, Wakefield, West Yorkshire, WF1 5DW
|22.214.171.124||mail-db5eur01on0071.outbound.protection.outlook.com||Dublin||Leinster||IE||AS8075 Microsoft Corporation|
Received: from mail-db5eur01on0071.outbound.protection.outlook.com ([126.96.36.199]:43461 helo=EUR01-DB5-obe.outbound.protection.outlook.com)
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-SHA384:256)
for vq5k9mifng3l91k@[redacted]; Tue, 11 Apr 2017 09:09:15 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
Received: from AM2PR08MB0225.eurprd08.prod.outlook.com (10.161.130.26) by
AM2PR08MB0226.eurprd08.prod.outlook.com (10.161.130.27) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id
15.1.1019.17; Tue, 11 Apr 2017 08:09:01 +0000
Received: from AM2PR08MB0225.eurprd08.prod.outlook.com
([fe80::9135:5dec:cfdf:6b2a]) by AM2PR08MB0225.eurprd08.prod.outlook.com
([fe80::9135:5dec:cfdf:6b2a%14]) with mapi id 15.01.1019.025; Tue, 11 Apr
2017 08:09:01 +0000
From: 40 Duncan Barker <DBarker@Howarth-Timber.co.uk>
Date: Tue, 11 Apr 2017 08:09:00 +0000
Accept-Language: en-GB, en-US
authentication-results: 1stquote.co.uk; dkim=none (message not signed)
header.d=none;1stquote.co.uk; dmarc=none action=none
x-originating-ip: [188.8.131.52] x-microsoft-exchange-diagnostics: 1;AM2PR08MB0226;7:IuE0Siv0egu6dDkbdA8eBJ3oNBdGB6+PFhcILRqPLEwAV+yr6PcZPn7jEtqvz0gTR890O4MoCawSXLNF5qbwpqmKYDsQYvjpdAkK/wwWnjL6wm2Yl6uZhWTn6J7gdjSpeRD5djRSK8r0bSPQaYqVaGz+9BhnJKFsIIQKGBvJOME8rMFaAG7MYkNdEqVK0Oru+flayAZm4njMYWnISS+nlDjOcZRTYzDeqOsowIByEIvou3Rp55AJTgGGl+vGdPWBVOmJpqc3kN5UyXK9E+ZZGCfZZLTiHF2vSsK3s2MP6Dn1euJ7v/m53ZesFstpJhbodQ2AoW0Fqo38FQ7Q9YIM4Q==;20:cKgbRvpZ33e2bfzPvCZ12XVhPmnrDrTtogO9rlOlGuyV1QtBNd28GhURWb6YTJsAeuLXSprlVU+XAo42q5v+PgO0EOoRzCgrxpQDZK8paGZRcc/ltX3RgYb6DFhlg+/BdsZHJ/VNdrtA3U9IWucimnZ5JHv1kGk3ggzHYZhdajk=
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Apr 2017 08:09:00.0711
This email has a genuine PDF attachment.
If you follow the link inside the pdf you first get directed to a bit.ly short url https://bitly.com/2otqZru which redirects you to http://coteimmo21.com/wp-content/plugins/dsidxpress/oine/cane.php which in turn redirects you to http://theselectva.com/contium/iones/ where you see this screenshot of a fake dropbox site ( for some reason in IE I only got the second screenshot with the html code & not the proper webpage) that only shows for me in Google chrome
After you select one of the options, Lets start with Gmail, you get this pop up
Then you get sent to an imitation of the Google Verification page where they ask for either your phone number or alternative email address
Then you get bounced to the genuine dropbox site that offers & in fact tries to auto-download the genuine dropbox installer
The other links on the index page lead to similar pop ups tailored to your email account
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.