We see lots of phishing attempts for email credentials. This one must be amongst the most inept attempts I have seen in a very long time. It pretends to be a message to change your password because your mailbox has been login some where else (sic)
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: Christine E. Wells <WellsCE@ccrsb.ca>
Date: Mon 05/06/2017 18:58
Subject: RE: WakeMed SERVICE DESK
WAKEMED IT DEPARTMENT HAS FOUND OUT THAT YOUR MAILBOX HAS BEEN LOGIN SOME WHERE ELSE CLICK-HERE TO CHANGE YOUR PASSWORD
Update new version. Almost identical but today it is Janice H. Sutherland <SutherlandJA@ccrsb.ca> who is supposed to be sending these.
New email is as bad as the previous one
From: Janice H. Sutherland
Sent: Tuesday, June 13, 2017 10:00 AM
Dear Email Users,
Your password Will Expire In The Next TWO HOURS Current Mail User Should Please Log On To IT-WEBSITE To Validate Your E-mail Address And Password, Or Your E-mail Address Will Be Deactivated. Thank You.
ITS help desk
©Copyright 2017 Microsoft
All Right Reserve
Link in this version is to: http://serviceeteam.tripod.com/
If you follow the link you see a very badly designed webpage, complete with spelling errors, obviously created by a non English speaker, looking like this: http://itupdat.tripod.com/
The only reason to even mention this abomination is the sending IP for the spam email is a compromised Canadian Nova Scotia Department of Education IP address that somebody needs to clean up
|126.96.36.199||cec-10.cec.EDnet.NS.CA||Truro||Nova Scotia||CA||AS23307 Nova Scotia Department of Education|
by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-SHA384:256)
for [redacted]; Mon, 05 Jun 2017 18:58:11 +0100
Received: from CO-WIN-EX-03.ad.ccrsb.ca (10.156.10.192) by
CO-WIN-EX-01.ad.ccrsb.ca (10.156.10.190) with Microsoft SMTP Server (TLS) id
15.0.1178.4; Mon, 5 Jun 2017 14:58:10 -0300
Received: from CO-WIN-EX-01.ad.ccrsb.ca (10.156.10.190) by
CO-WIN-EX-03.ad.ccrsb.ca (10.156.10.192) with Microsoft SMTP Server (TLS) id
15.0.1178.4; Mon, 5 Jun 2017 14:58:09 -0300
Received: from CO-WIN-EX-01.ad.ccrsb.ca ([fe80::2d33:138a:5e3:6386]) by
CO-WIN-EX-01.ad.ccrsb.ca ([fe80::2d33:138a:5e3:6386%12]) with mapi id
15.00.1178.000; Mon, 5 Jun 2017 14:58:09 -0300
From: “Christine E. Wells” <WellsCE@ccrsb.ca>
To: “Christine E. Wells” <WellsCE@ccrsb.ca>
Subject: RE: WakeMed SERVICE DESK
Thread-Topic: WakeMed SERVICE DESK
Date: Mon, 5 Jun 2017 17:58:08 +0000
Accept-Language: en-CA, en-US
x-originating-ip: [188.8.131.52] Content-Type: multipart/alternative;
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.