{"id":16237,"date":"2022-06-28T16:08:32","date_gmt":"2022-06-28T16:08:32","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?page_id=16237"},"modified":"2023-03-31T09:17:14","modified_gmt":"2023-03-31T09:17:14","slug":"bank-of-america-alert-phishing","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/bank-of-america-alert-phishing\/","title":{"rendered":"Bank Of America Alert \u2013 Phishing"},"content":{"rendered":"

I am seeing quite an aggressive phishing campaign against Bank of America arriving overnight UK time. They all pretend to come from Bank of America < BankofAmerica@customerloyalty.accounts.com > but are actually coming from various servers. I have posted details of 2 that I received. The emails are identical apart for the subject line. There will almost certainly be other similar subjects that I haven\u2019t seen yet.<\/p>\n

The subjects I have seen so far are:<\/p>\n

Bank of America AlertSign-in to Online Banking Locked
\nBank of America Alert: Unlock Your Account Important Message From Bank Of America \u00c2\u00ae<\/p>\n

They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

Bank of America or accounts.com have not been hacked or had their email or other servers compromised. They are not sending the emails to you. They are just innocent victims in exactly the same way as every recipient of these emails.<\/p>\n

You can now submit suspicious sites, emails and files via our Submissions system
\nRemember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.<\/p>\n

The email looks like:<\/p>\n

From: Bank of America <BankofAmerica@customerloyalty.accounts.com><\/p>\n

Date: Wed 17\/01\/2018 00:12<\/p>\n

Subject: Bank of America AlertSign-in to Online Banking Locked<\/p>\n

Body content:<\/p>\n

To ensure delivery, add onlinebanking@ealerts.bankofamerica.com to your address book.<\/p>\n

Online Banking Alert<\/p>\n

Online Banking Unauthorized Sign-In
\nSecurity Checkpoint: Online Banking Unauthorized Sign-In<\/p>\n

Remember: Always look for your SiteKey\u00ae before entering your Passcode.<\/p>\n

Date: 01\/17\/2018<\/p>\n

As part of our security measures, our system regularly scheduled account maintenance and verification procedures, we have detected a slight error in your online banking information. Our system requires account verification for more security and protection to your account , To confirm this verification Sign-In to your online banking and update your information.<\/p>\n

Security Checkpoint: This email includes a Security Checkpoint. The information in this section lets you know this is an authentic communication from Bank of America. Remember to look for your SiteKey every time you sign in to Online Banking.<\/p>\n

Email preferences<\/p>\n

This is a service email from Bank of America. Please note that you may receive service email in accordance with your Bank of America service agreements, whether or not you elect to receive promotional email.<\/p>\n

Contact us about this email<\/p>\n

Please do not reply to this email with sensitive information, such as an account number, PIN, password, or Online ID. The security and confidentiality of your personal information is important to us. If you have any questions, please either call the toll-free customer service phone number on your account statement or visit the Bank of America website to access the Contact Us page, so we can properly verify your identity.<\/p>\n

Privacy and security<\/p>\n

Keeping your financial information secure is one of our most important responsibilities. For an explanation of how we manage customer information, please visit the Bank of America website to read our Privacy Policy. You can also learn how Bank of America keeps your personal information secure and how you can help protect yourself.<\/p>\n

Bank of America Email, 8th Floor-NC1-002-08-25, 101 South Tryon St., Charlotte, NC 28255-0001<\/p>\n

Bank of America, N.A. Member FDIC. Equal Housing Lender
\n\u00a9 2018 Bank of America Corporation. All rights reserved.<\/p>\n

The link in the email http:\/\/www.valaskabela.sk\/new.php redirects you to http:\/\/bankofamerica-com-update-work-new2018.hbdhshjdsjkds.co.uk\/d983474dae569d3bdffe8735ae43151a\/ (random ID \/referral string after the co.uk\/ )<\/p>\n

We all get very blas\u00e9 about phishing and think we know so much that we will never fall for a phishing attempt. Don\u2019t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says \u201cyou have won a prize\u201d or \u201csign up to this website for discounts, prizes and special offers\u201d<\/p>\n

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\n

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n

Email Headers and web site details:<\/p>\n\n\n\n\n\n
IP<\/th>\nHostname<\/th>\nCity<\/th>\nRegion<\/th>\nCountry<\/th>\nOrganisation<\/th>\n<\/tr>\n<\/thead>\n
5.44.105.121<\/i><\/td>\nlax1.idcserver79.net<\/td>\nLos Angeles<\/td>\nCalifornia<\/td>\nUS<\/td>\nAS29066 velia.net Internetdienste GmbH<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Received: from [5.44.105.121] (port=48780 helo=lax1.idcserver79.net)
\nby knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
\n(Exim 4.89_1)
\n(envelope-from <alld3s1g@lax1.idcserver79.net>)
\nid 1ebbKM-0004HG-2T
\nfor dwuser@victimsdomain.com; Wed, 17 Jan 2018 00:11:38 +0000
\nReceived: from alld3s1g by lax1.idcserver79.net with local (Exim 4.89_1)
\n(envelope-from <alld3s1g@lax1.idcserver79.net>)
\nid 1ebbKL-000rHG-4c
\nfor dwuser@victimsdomain.com; Wed, 17 Jan 2018 07:11:37 +0700
\nDate: Wed, 17 Jan 2018 07:11:37 +0700
\nTo: dwuser@victimsdomain.com
\nFrom: Bank of America <BankofAmerica@customerloyalty.accounts.com>
\nReply-To:
\nSubject: Bank of America AlertSign-in to Online Banking Locked
\nMessage-ID: <042c75ef2ce232b95b6390f2cba29af3@alldesigncorps.com>
\nX-Priority: 3
\nX-Mailer: PHPMailer (phpmailer.sourceforge.net) [version ] MIME-Version: 1.0
\nContent-Transfer-Encoding: 8bit
\nContent-Type: text\/html; charset=\u201diso-8859-1\u2033
\nX-AntiAbuse: This header was added to track abuse, please include it with any abuse report
\nX-AntiAbuse: Primary Hostname \u2013 lax1.idcserver79.net
\nX-AntiAbuse: Original Domain \u2013 victimsdomain.com
\nX-AntiAbuse: Originator\/Caller UID\/GID \u2013 [514 498] \/ [47 12] X-AntiAbuse: Sender Address Domain \u2013 lax1.idcserver79.net
\nX-Get-Message-Sender-Via: lax1.idcserver79.net: authenticated_id: alld3s1g\/only user confirmed\/virtual account not confirmed
\nX-Authenticated-Sender: lax1.idcserver79.net: alld3s1g
\nX-Source:
\nX-Source-Args: \/usr\/sbin\/proxyexec -q -d -s \/var\/lib\/proxyexec\/cagefs.sock\/socket \/bin\/cagefs.server
\nX-Source-Dir: alldesigncorps.com:\/public_html\/media\/media\/css<\/p>\n\n\n\n\n\n
IP<\/th>\nHostname<\/th>\nCity<\/th>\nRegion<\/th>\nCountry<\/th>\nOrganisation<\/th>\n<\/tr>\n<\/thead>\n
90.156.141.97<\/i><\/td>\nvm555934.vps.masterhost.ru<\/td>\n<\/td>\n<\/td>\nRU<\/td>\nAS25532 LLC MASTERHOST<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Received: from vm555934.vps.masterhost.ru ([90.156.141.97]:38366 helo=yamed.ru)
\nby knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
\n(Exim 4.89_1)
\n(envelope-from <yamed@yamed.ru>)
\nid 1ebbKF-0004Gv-8A
\nfor dwuser@victimsdomain.com; Wed, 17 Jan 2018 00:11:31 +0000
\nReceived: from yamed by yamed.ru with local (Exim 4.84_2)
\n(envelope-from <yamed@yamed.ru>)
\nid 1ebbKF-0006ca-Em
\nfor dwuser@victimsdomain.com; Wed, 17 Jan 2018 03:11:31 +0300
\nDate: Wed, 17 Jan 2018 03:11:31 +0300
\nTo: dwuser@victimsdomain.com
\nFrom: Bank of America <BankofAmerica@customerloyalty.accounts.com>
\nReply-To:
\nSubject: =?iso-8859-1?Q?Bank_of_America_Alert:_Unlock_Your_Account_Important_Messa?=
\n=?iso-8859-1?Q?ge_From_Bank_Of_America_=C2=AE?=
\nMessage-ID: <ba5839f012ac83bb3b7b6052cea2b02f@ymcworld.com>
\nX-Priority: 3
\nX-Mailer: PHPMailer (phpmailer.sourceforge.net) [version ] MIME-Version: 1.0
\nContent-Transfer-Encoding: 8bit
\nContent-Type: text\/html; charset=\u201diso-8859-1\u2033<\/p>\n

The website actually hosting the phish is hbdhshjdsjkds.co.uk which was registered on 16-Jan-2018 using what are almost certainly fake details. Registered via Enom and hosted by Bluehost on 162.241.225.135<\/p>\n

Domain name:
\nhbdhshjdsjkds.co.uk<\/p>\n

Registrant:
\nGebhart Gregg J<\/p>\n

Registrant type:
\nUK Individual<\/p>\n

Registrant\u2019s address:
\n805 RODEO ST
\nGILLETTE
\nWyoming
\n82718
\nUnited States<\/p>\n

Data validation:
\nNominet was not able to match the registrant\u2019s name and\/or address against a 3rd party source on 16-Jan-2018<\/p>\n

Registrar:
\neNom LLC [Tag = ENOM] URL: http:\/\/www.enom.com<\/p>\n

Relevant dates:
\nRegistered on: 16-Jan-2018
\nExpiry date: 16-Jan-2019
\nLast updated: 16-Jan-2018<\/p>\n

Registration status:
\nRegistered until expiry date.<\/p>\n

Name servers:
\nns1.bluehost.com
\nns2.bluehost.com<\/p>\n

WHOIS lookup made at 04:17:22 17-Jan-2018<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

I am seeing quite an aggressive phishing campaign against Bank of America arriving overnight UK time. They all pretend to come from Bank of America < BankofAmerica@customerloyalty.accounts.com > but are actually coming from various servers. I have posted details of 2 that I received. The emails are identical apart for the subject line. There will…<\/p>\n","protected":false},"author":4,"featured_media":13425,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"default","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/Phishing-Scam.jpg",1000,723,false],"author_info":{"display_name":"myonlinesecurity","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/myonlinesecurity\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/16237"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=16237"}],"version-history":[{"count":1,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/16237\/revisions"}],"predecessor-version":[{"id":28212,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/16237\/revisions\/28212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13425"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=16237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}