We see lots of phishing attempts. This one pretends to be a BT bill and then asks for just about everything to steal your money and your identity
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.
What makes this one so bad is the fact the actual phish is hosted on an Indonesian University http://arsitektur.ub.ac.id
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: BT PLC [GB] <email@example.com>
Date: Sun 18/03/2018 17:32
Subject: Your BT bill is now overdue!
Your BT bill is now overdue
Hello firstname.lastname@example.org ,
Your latest bill is now overdue. You can view it online at My BT or on the app. To log in, you’ll need your BT ID. This is usually your email address.
Click here to pay your bill now!
You need to pay it as soon as possible to avoid service intreruption!
Got questions about your bill?
Take a look at our bill explainer tool for more help. Or, chat with us online between 7am and 11pm every day – just click below to get started (it works on mobiles, too).
Go to bill explainer tool
If you follow the link in the email you first get sent to http://adisuae.com/knowhelpdesk/ ( a compromised or hacked Abu Dhabi Indian School) then immediately redirected to http://arsitektur.ub.ac.id/executesbtuk/lognfrward.php?redirectURL=personal-Confirm&process_ID=riKavaTiZosEhQSTiLqPOIIZMSteyPc which is obviously a compromised section on an Indonesian university site.
Enter a user name ( email address) & password then get sent to the personal information page
Next gets the payment details page
Then you get a success page and are forwarded to the genuine BT pages.
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.
|184.108.40.206||rrkouseikai.ecnet.jp||JP||AS4713 NTT Communications Corporation|
|220.127.116.11||Singapore||Central Singapore Community Development Council||SG||AS133165 Digital Ocean, Inc.|
Received: from rrkouseikai.ecnet.jp ([18.104.22.168]:39531)
by my mail server with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
for email@example.com; Sun, 18 Mar 2018 17:32:01 +0000
Received: from localhost.localdomain (unknown [22.214.171.124])
by rrkouseikai.ecnet.jp (Postfix) with ESMTPA id 19E5E6003EE8
for <firstname.lastname@example.org>; Mon, 19 Mar 2018 02:31:57 +0900 (JST)
Date: Sun, 18 Mar 2018 17:31:57 +0000
From: =?UTF-8?B?QlQgUExDIFtHQl0=?= <email@example.com>
X-Mailer: PHPMailer 5.2.2-rc2
Content-Type: text/html; charset=utf-8