{"id":16199,"date":"2022-06-28T14:37:50","date_gmt":"2022-06-28T14:37:50","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?page_id=16199"},"modified":"2023-04-03T07:04:50","modified_gmt":"2023-04-03T07:04:50","slug":"fake-distell-co-za-order-invoice-phishing-scam","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/fake-distell-co-za-order-invoice-phishing-scam\/","title":{"rendered":"Fake Distell.co.za Order \/ Invoice Phishing Scam"},"content":{"rendered":"

We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated.<\/p>\n

When I received the email I was convinced it was going to be a malware delivery attempt, but instead it is a slightly devious & complicated method of phishing for email credentials.<\/p>\n

They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

You can now submit suspicious sites, emails and files via our Submissions system
\nRemember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.<\/p>\n

These do actually come via distell.co.za, or at least via their authorised mail sending service ( mimecast) so it is likely that a user\u2019s log in details have been compromised<\/p>\n

The email looks like:<\/p>\n

From: Moolman, Enrico <EFMoolman@distell.co.za><\/p>\n

Date: Tue 29\/05\/2018 08:00<\/p>\n

Subject: Send invoice for payment<\/p>\n

Attachment: New_Order.ZIP<\/p>\n

Body content:<\/p>\n

Hello,<\/p>\n

Truth you are doing well,<\/p>\n

Please find attached our purchase order for your attention. process and send us proforma so we make payment today, also advice on when we should expect delivery.<\/p>\n

Disclaimer<\/p>\n

Attention: The legal status of this communication is governed by the terms and conditions published at the following link. For reporting any unethical or fraudulent behaviour, please contact our toll-free anonymous hotline on 0800 004 822.<\/p>\n

Visit South Africa\u2019s premier producer and marketer of fine wines, spirits, ciders and ready-to-drinks (RTDs) at http:\/\/www.distell.co.za.<\/p>\n

Screenshot:<\/p>\n

\"moolman\"<\/p>\n

This email has a html attachment in encoded url format that when opened in browser shows you a webpage like this with a small image of an order or invoice and a link to view document.<\/p>\n

\"Fake<\/p>\n

Once you click the view Document link you see this page, where you can input your details<\/p>\n

\"Fake<\/p>\n

After you fill in details you get sent to a page with an image of an invoice or order hosted on http:\/\/portiahairstyles.org\/petrurd.php while your stolen details are sent to http:\/\/portiahairstyles.org\/ppp.php ( which is either a compromised website or has been newly set up to perform this phishing attack) The home page has a default site now set up message from Inmotion Hosting. on Ip 209.182.200.172<\/p>\n

\"Omega\"<\/p>\n

Then you get forwarded to a genuine Gmail page<\/p>\n

We all get very blas\u00e9 about phishing and think we know so much that we will never fall for a phishing attempt. Don\u2019t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says \u201cyou have won a prize\u201d or \u201csign up to this website for discounts, prizes and special offers\u201d<\/p>\n

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\n

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n

Email Headers:<\/h3>\n\n\n\n\n\n\n
IP<\/th>\nHostname<\/th>\nCity<\/th>\nRegion<\/th>\nCountry<\/th>\nOrganisation<\/th>\n<\/tr>\n<\/thead>\n
41.74.205.119<\/i><\/td>\nza-smtp-delivery-119.mimecast.co.za<\/td>\n<\/td>\n<\/td>\nZA<\/td>\nAS37235 Mimecast South Africa<\/td>\n<\/tr>\n
10.33.36.70<\/td>\nPrivate IP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Received: from za-smtp-delivery-119.mimecast.co.za ([41.74.205.119]:20374)
\nby My Email Server with esmtps (TLSv1.2:ECDHE-RSA-AES256-SHA384:256)
\n(Exim 4.91)
\n(envelope-from <efmoolman@distell.co.za>)
\nid 1fNYc0-0003TP-H8
\nfor security@myonlinesecurity.co.uk; Tue, 29 May 2018 08:00:05 +0100
\nSubject: Send invoice for payment
\nMessage-ID: <Mimecast.da8.a66d528986070677.163aab20bc8@za-sl-28.za.mimecast.lan>
\nFrom: \u201cMoolman, Enrico\u201d <EFMoolman@distell.co.za>
\nDate: Tue, 29 May 2018 08:59:45 +0200
\nMIME-Version: 1.0
\nReceived: from null (za-sl-28.za.mimecast.lan [10.33.36.70]) (Using TLS) by
\nza-smtp-1.mimecast.co.za with ESMTP id
\nza-mta-35-8013f-a119c55e-ac24-4cc9-8712-4769bd42fe5f-1; Tue, 29 May 2018
\n08:59:47 +0200
\nX-MC-Unique: 8013f-a119c55e-ac24-4cc9-8712-4769bd42fe5f-1
\nContent-Type: multipart\/mixed;
\nboundary=\u201dMCBoundary=_11805290859450041\u2033<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated. When I received the email I was convinced it was going to be a malware delivery attempt, but instead it is a slightly devious & complicated method of phishing for email credentials….<\/p>\n","protected":false},"author":4,"featured_media":13425,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"default","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/Phishing-Scam.jpg",1000,723,false],"author_info":{"display_name":"myonlinesecurity","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/myonlinesecurity\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/16199"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=16199"}],"version-history":[{"count":2,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/16199\/revisions"}],"predecessor-version":[{"id":28379,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/16199\/revisions\/28379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13425"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=16199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}