We see lots of phishing attempts for email credentials. The scammers get ever more creative and try new and different tricks all the time. This one pretends to be a request for a quotation for an urgent order.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. Most recipients will automatically see this as the scam it is, but a small percentage of recipients will be small companies wanting to do business with foreign companies and can be fooled into giving their details. The scattergun approach where the scammers send out hundreds or thousands of emails will always result in a few recipients responding. 1or 2 in every thousand is a good enough response from the phishers and scammers to make it a financially viable scam.
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: Honei weng <firstname.lastname@example.org>
Date: Wed 23/08/2017 06:09
Subject: URGENT ORDER
We want to order items in Attach file.
We require your quotation with your best price offer
We need to order ASAP.
Awaiting your reply.
This email has a HTML attachment that when opened pretends to be a login for adobe pdf and you need to enter your email address and password
The submit button goes to https://submit.jotform.us/submit/50743007966559/ which is a backend system on a legitimate forms service being abused by these scammers and spammers
Jotform.com respond to abuse complaints very quickly and have an absolute 0 tolerance for any abuse of their service. It took them just over 1 hour to respond & disable the offending account. which is an excellent response time bearing in mind that is 3 am in USA where they are based. They genuinely do have a 24/7 support and abuse service. I only wish other hosting services were as efficient.
After you input your email address and password, you get told incorrect details on this page which has a picture of a windows desktop with an incorrect login image
Received: from mail.ideant.co.kr ([126.96.36.199]:49062 helo=ideant.co.kr)
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for email@example.com; Wed, 23 Aug 2017 06:18:53 +0100
Received: (qmail 17873 invoked by uid 491); 23 Aug 2017 14:10:00 +0900
Received: from unknown (HELO ?188.8.131.52?) (firstname.lastname@example.org@184.108.40.206)
by 0 (knetqmail v1.06) with ESMTPA;
23 Aug 2017 14:10:00 +0900
Content-Type: multipart/mixed; boundary=”===============1283262781==”
Subject: URGENT ORDER
To: Recipients <email@example.com>
From: “Honei weng” <firstname.lastname@example.org>
Date: Wed, 23 Aug 2017 13:09:24 +0800
These DO NOT come from any mail.de user that is simply spoofed instead they come via what is likely to be a compromised Korean server or email account.
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.