Happy New Year!
A new year brings new phish.
Phishing Email Alerts
Catch of the Day: Mailjet Phish
Chef’s Special: Facebook Messenger Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to email@example.com.
My intention is to provide a warning, examples of current phishing scams, related articles, and education about how these scams and exploits work, and how to detect them in your own inbox. If the pictures are too small or extend off the page, double-clicking on them will open them up in a photo viewer app.
I received this email from MailJet. The sender email address is from the domain sendmail.adria-klik.com. This domain belongs to a Croatian online supermarket. Potentially their Sendmail server has been compromised, and is sending these phishing messages.
Adria-Klick.com online is a Croatian grocery website. Croatian – Voliš kolačiće? Dobrodošao! Klikni na Volim Kolačiće i dođi vidjeti što češ piti i papati. English – Do you like cookies? Welcome! Click on I love cookies and come see what you will drink and drink.
The email headers showed the origin coming from an Office.com mail server (alpha677.startdedicated.com [220.127.116.11])
Received: from [18.104.22.168] ([22.214.171.124]) by mx.perfora.net (mxeueus005
[126.96.36.199]) with ESMTPS (Nemesis) id 1Mrgoy-1kL2z008ZQ-00ni00 for
<firstname.lastname@example.org>; Sun, 20 Dec 2020 18:09:38 +0100
Received: from m32-12.eu.mailgun.net ([188.8.131.52]) by mx.perfora.net
(mxeueus005 [184.108.40.206]) with ESMTPS (Nemesis) id 1M1ZI7-1ko1H706Wp-0039dP
for <email@example.com>; Sun, 20 Dec 2020 18:09:38 +0100
DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=sendmail.adria-klik.com;
q=dns/txt; s=krs; t=1608484177; h=Content-Type: Message-Id: Date:
Subject: To: From: MIME-Version: Sender;
Received: from office.com (alpha677.startdedicated.com [220.127.116.11]) by
smtp-out-n03.prod.eu-central-1.postgun.com with SMTP id
cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA); Sun, 20 Dec 2020 17:08:20 GMT
From: Mailjet Support <firstname.lastname@example.org>
Subject: Mailjet- Receipt
Date: Sun, 20 Dec 2020 18:08:20 +0100 368692793
The displayed link https://app.mailjet.com/billing/invoice/4kvtqq66 – goes to 404 page, but actually resolves to: http://app.mailjet.com.signin.athu.ord.new.session.12872684.flugfunklehrer.de/c4ca4238a0b923820dcc509a6f75849b/5aecdccf52282419085f25d1cf101e47/e919cc3f36f13f94bba4b5770aa7a322/ffc5e01f578535fd6f95f889cb31939d
The URL looks legit until you work down through all the sub-domains to the actual primary domain flugfunklehrer.de which translates to radio instructor. The hijacked website is for a German flight school.
Finally, here is the landing page that is hidden on the hijacked website of the flight school. This is a basic credential stealing exploit.
What’s interesting is all the different moving parts – hijacked email accounts or email servers, one and possibly two highjacked web sites. Its a lot of work to go through just to collect a set of user credentials.
Virus Suspected Alert
This was an alert from my email host. It’s nice when your email service provider can catch a few for you, like this one. It is still possible to see the scammy parts of this message.
This example is from Sophos Naked Security blog. If you get a message like this from a friend, beware – it means their account was hijacked.
Clicking on the video will take you to a fake Facebook login page, and if you fill it out, your account will be hijacked too. To see the full exploit with a longer explanation, read the original article on Sophos Naked Security blog.