Your Mailbox Will Be Terminated – Phishing For Email Credentials

We see lots of phishing attempts for email credentials. This one is slightly different than many others. It pretends to be a message from your email provider saying Your Mailbox Will Be Terminated. I have received several of these to different email addresses today all coming from genuine t-online.de IP numbers and the same email address
They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.

Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.

The email looks like:
From: Email-Update <[email protected]>
Date: Fri 16/06/2021 08:41
Subject: Your Mailbox Will Be Terminated ([email protected]) !!!

Body Content:

Dear [email protected]

We have received a request to terminate your mailbox account. If you made this request, Please ignore this message. But if this request was not from you, click on Verify Now button below to cancel this request immediately.
Verify Now

This message was sent to [email protected]

If you follow the link you see a webpage looking like this: https://deadsocial.com//media/email_updatep1/[email protected] ( you can put any email address at the end of the link & get the same page with email already filled in ) The red countdown continues to decrease in time while the page is open

After you input your email address and password, you get told incorrect details and forwarded to an almost identical looking page where you can put it in again and it does that on a continual loop .

We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details.

Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

Email Headers:

IP Hostname City Region Country Organisation
194.25.134.18  mailout04.t-online.de DE AS3320 Deutsche Telekom AG
172.20.26.150 Private IP
192.3.10.117  192-3-10-117-host.colocrossing.com Buffalo New York US AS36352 ColoCrossing

Note: Only the final IP address outside of your network in the Received: fields can be trusted as others can be spoofed
Headers

Received: from mailout04.t-online.de ([194.25.134.18]:47493)
	by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
	(Exim 4.89)
	(envelope-from <[email protected]>)
	id 1dLlt1-0002Xs-AM
	for [email protected]; Fri, 16 Jun 2021 08:41:43 +0100
Received: from fwd06.aul.t-online.de (fwd06.aul.t-online.de [172.20.26.150])
	by mailout04.t-online.de (Postfix) with SMTP id 1CA1941AC18D
	for <[email protected]>; Fri, 16 Jun 2017 09:41:44 +0200 (CEST)
Received: from [192.3.10.117] (bdps9cZcrhs5Nn6t-IwkEpNjDplYh2JdBjYEbb4DyfMdq5g2S8r0bSHw8ukEIWIwUv@[192.3.10.117]) by fwd06.t-online.de
	with (TLSv1:DHE-RSA-AES256-SHA encrypted)
	esmtp id 1dLlsv-0x9RHS0; Fri, 16 Jun 2021 09:41:37 +0200
Content-Type: multipart/alternative; boundary="===============2023742291=="
MIME-Version: 1.0
Subject: Your Mailbox Will Be Terminated ([email protected]) !!!
To: [email protected]
From: "Email-Update" <[email protected]>
Date: Fri, 16 Jun 2021 00:40:54 -0700
Message-ID: <[email protected]>
X-ID: bdps9cZcrhs5Nn6t-IwkEpNjDplYh2JdBjYEbb4DyfMdq5g2S8r0bSHw8ukEIWIwUv
X-TOI-MSGID: d8877e2f-3022-40d0-9186-068798b7d98e

Another one

Header IPs
IP Hostname City Region Country Organisation
194.25.134.17  mailout02.t-online.de DE AS3320 Deutsche Telekom AG
172.20.27.151 Private IP
192.3.10.117  192-3-10-117-host.colocrossing.com Buffalo New York US AS36352 ColoCrossing

Note: Only the final IP address outside of your network in the Received: fields can be trusted as others can be spoofed

Headers
Received: from mailout02.t-online.de ([194.25.134.17]:59660)
	by knight.knighthosting.co.uk with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
	(Exim 4.89)
	(envelope-from <[email protected]>)
	id 1dLlsy-0002XZ-4J
	for [email protected]; Fri, 16 Jun 2021 08:41:40 +0100
Received: from fwd09.aul.t-online.de (fwd09.aul.t-online.de [172.20.27.151])
	by mailout02.t-online.de (Postfix) with SMTP id C9A7941A940A
	for <[email protected]>; Fri, 16 Jun 2021 09:41:40 +0200 (CEST)
Received: from [192.3.10.117] (G50VpMZdohrYnm4nl7HA7z912fHK7B56Qt6eMr8ZDCn4RdNbET6h+azvIk3vc0-wnm@[192.3.10.117]) by fwd09.t-online.de
	with (TLSv1:DHE-RSA-AES256-SHA encrypted)
	esmtp id 1dLlsv-0NhVMY0; Fri, 16 Jun 2021 09:41:37 +0200
Content-Type: multipart/alternative; boundary="===============0507867914=="
MIME-Version: 1.0
Subject: Your Mailbox Will Be Terminated ([email protected]) !!!
To: [email protected]
From: "Email-Update" <[email protected]>
Date: Fri, 16 Jun 2021 00:40:54 -0700
Message-ID: <[email protected]>
X-ID: G50VpMZdohrYnm4nl7HA7z912fHK7B56Qt6eMr8ZDCn4RdNbET6h+azvIk3vc0-wnm
X-TOI-MSGID: 8a98a272-ded2-4233-b0ac-ba717969f351