{"id":17253,"date":"2022-11-15T12:16:45","date_gmt":"2022-11-15T12:16:45","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?page_id=17253"},"modified":"2023-04-03T08:41:51","modified_gmt":"2023-04-03T08:41:51","slug":"fake-live-com-update-your-mailbox-phishing-scam","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/fake-live-com-update-your-mailbox-phishing-scam\/","title":{"rendered":"Fake Live.com Update Your Mailbox Phishing Scam"},"content":{"rendered":"

\"Phishing\"We see lots of phishing attempts for email credentials. This one is slightly different than many others. It pretends to be a message from Email Support to Update Your Mailbox. Of course these don\u2019t come from Microsoft or Live.com but are spoofed to appear to come from them.<\/p>\n

They use email addresses and subjects that will scare, persuade or entice a user to read the email and follow the link. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.<\/p>\n

The email looks like:<\/p>\n

From:<\/strong> Email Support <noreply@live.com><\/p>\n

Date:<\/strong> Mon 08\/05\/2017 02:58<\/p>\n

Subject:<\/strong> E-mail Account Update<\/p>\n

Body content:<\/strong><\/p>\n

Update Your Mailbox<\/em>
\nDear jeremiah@thespykiller.co.uk,<\/em><\/p>\n

Within 24 hours, if you do not update your mailbox, your email will be disabled. Failure to update your e-mail account, It will be permanently terminated.<\/em>
\nUpdate Your MailBox<\/em>
\nCopyright \u00a9 E-mail Support Service. 2017<\/em><\/p>\n

Screenshot:<\/strong><\/p>\n

\"\"<\/p>\n

Email Headers:<\/strong><\/p>\n\n\n\n\n\n\n
IP<\/th>\nHostname<\/th>\nCity<\/th>\nRegion<\/th>\nCountry<\/th>\nOrganisation<\/th>\n<\/tr>\n<\/thead>\n
69.130.7.126\u00a0<\/i><\/td>\nmail.addonusa.com<\/td>\n<\/td>\n<\/td>\nUS<\/td>\nAS4181 TDS TELECOM<\/td>\n<\/tr>\n
212.175.129.33\u00a0<\/i><\/td>\n212.175.129.33.static.ttnet.com.tr<\/td>\nAnkara<\/td>\nAnkara<\/td>\nTR<\/td>\nAS9121 Turk Telekomunikasyon Anonim Sirketi<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Received: from mail.addonusa.com ([69.130.7.126]:53623)<\/em>
\nby knight.knighthosting.co.uk with esmtp (Exim 4.89)<\/em>
\n(envelope-from <noreply@live.com>)<\/em>
\nid 1d7Xv1-0006IL-AO<\/em>
\nfor jeremiah@thespykiller.co.uk; Mon, 08 May 2017 02:57:03 +0100<\/em>
\nReceived: from live.com (unknown [212.175.129.33])<\/em>
\nby mail.addonusa.com (Postfix) with ESMTPSA id 322F3C4921F<\/em>
\nfor <jeremiah@thespykiller.co.uk>; Sun, 7 May 2017 21:56:34 -0400 (EDT)<\/em>
\nFrom: Email Support <noreply@live.com><\/em>
\nTo: jeremiah@thespykiller.co.uk<\/em>
\nSubject: E-mail Account Update<\/em>
\nDate: 08 May 2017 04:57:31 +0300<\/em>
\nMessage-ID: <20170508045730.8E5AE27BEE5716AC@live.com><\/em>
\nMIME-Version: 1.0<\/em>
\nContent-Type: text\/html;<\/em>
\ncharset=\u201diso-8859-1\u2033<\/em>
\nContent-Transfer-Encoding: quoted-printable<\/em><\/p>\n

If you follow the link inside the email you see a webpage looking like this: http:\/\/www.mir-holoda.by\/pic\/fanc\/en-gb\/?email=jeremiah@thespykiller.co.uk ( where the email address the email was sent to is automatically inserted)<\/p>\n

\"\"<\/p>\n

After you input your password, you first get get told \u201cchecking details\u201d then \u201cincorrect details\u201d and forwarded to an almost identical looking page where you can put it in again and each time it goes round the same saga.<\/p>\n

\"\"<\/p>\n

\"\"<\/p>\n

\"\"<\/p>\n

We all get very blas\u00e9 about phishing and think we know so much that we will never fall for a phishing attempt. Don\u2019t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says \u201cyou have won a prize\u201d or \u201csign up to this website for discounts, prizes and special offers\u201d<\/p>\n

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\n

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n","protected":false},"excerpt":{"rendered":"

We see lots of phishing attempts for email credentials. This one is slightly different than many others. It pretends to be a message from Email Support to Update Your Mailbox. Of course these don\u2019t come from Microsoft or Live.com but are spoofed to appear to come from them. They use email addresses and subjects that…<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"default","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"myonlinesecurity","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/myonlinesecurity\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/17253"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=17253"}],"version-history":[{"count":2,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/17253\/revisions"}],"predecessor-version":[{"id":28419,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/17253\/revisions\/28419"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=17253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}