We see lots of phishing attempts for email credentials. This one is slightly different than many others I receive. It pretends to be a message saying “Verify your email to avoid service interruption”.
What is unusual about this set of phishing emails is that the emails are written in Chinese. The webpage is in Chinese, but they are being sent to English speaking email addresses.
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from individual consumers.
I have received several of these today all to different names and email domains on my server.
They all pretend to come from the same sending address postmaster <firstname.lastname@example.org> but are actually coming from a USA based server that is probably compromised somehow or has an open email relay.
mrc-et.com has not been hacked or had their email or other servers compromised. They are not sending the emails to you. They are just innocent victims in exactly the same way as every recipient of these emails
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
One of the emails looks like:
From: postmaster <email@example.com>
Date: Tue 27/03/2018 03:14
Subject: firstname.lastname@example.org 验证您的邮箱，以避免服务中断 ( Verify your email to avoid service interruption)
If you follow the link inside the email : https://email@example.com (The email = will be the recipient’s email address)
you see this page with a count down in red to make sure you fill it in quickly
Countdown to your email shutdown:
To prevent your email from closing, verify your account details below:
then it asks you to repeat
Account verification, unsuccessful for firstname.lastname@example.org!
try again! And make sure you enter the correct password for this email.
You will soon be redirected back!
then you go to a checking page,
Then you get a success page where it automatically diverts you to your domain home page
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
|184.108.40.206||Canton||Ohio||US||AS62605 Untangled Technology, LLC|
Received: from [220.127.116.11] (port=40350 helo=controller.fairlawn.tac.global)
by my email server with esmtp (Exim 4.89_1)
for email@example.com; Tue, 27 Mar 2018 03:14:17 +0100
Received: from mrc-et.com (localhost [IPv6:::1])
by controller.fairlawn.tac.global (Postfix) with ESMTP id 7564D100F10
for <firstname.lastname@example.org>; Mon, 26 Mar 2018 22:14:16 -0400 (EDT)
From: postmaster <email@example.com>
Subject: firstname.lastname@example.org =?UTF-8?B?6aqM6K+B5oKo55qE6YKu566x77yM5Lul6YG/5YWN5pyN5Yqh5Lit5pat?=
Date: 27 Mar 2018 05:14:19 +0300