phishing

We see lots of phishing attempts for email credentials. This one is slightly different than many others and somewhat more  complicated. It pretends to be a message to download a voicemail.

You can now submit suspicious sites, emails and files via our Submissions system

Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.

This appeared to be sent from an outlook.com mail server and it is almost certain the alleged sender details have been spoofed entirely.

The email looks like:

From: Vesselina Zlatareva <This email address is being protected from spambots. You need JavaScript enabled to view it.>

Date: Fri 07/06/2019 11:02

Subject: Message From +44 875 10** **

Body content:

New Message.

Listen to this message and continue the conversation!

Please Click Here

Screenshot:

Fake Voicemail phishing email

Fake Voicemail phishing email

 

 

If you follow the link in the email you get sent to  http://www.climbfinder.co.uk  where you are silently redirected to and you  see a webpage looking like this which simply contains an embedded pdf file.

https://netorg3403047-my.sharepoint.com/personal/hflores_mar-comm_co/_layouts/15/onedrive.aspx?id=%2Fpersonal%2Fhflores%5Fmar%2Dcomm%5Fco%2FDocuments%2Fstave%2Epdf&parent=%2Fpersonal%2Fhflores%5Fmar%2Dcomm%5Fco%2FDocuments&cid=6f886ebd-7453-46e1-8ce7-d209afd410dc

sharepoint phishing site

sharepoint phishing site

 

When you click the link in the pdf you get sent back to the original domain, pretending to be a Microsoft OneDrive sign in page, but this time to

http://www.climbfinder.co.uk/wp-content/themes/bouquet/images/others/<random string>.php?<random very long string session ID>

for example

http://www.climbfinder.co.uk/wp-content/themes/bouquet/images/others/1wu4qeky5opi9ceqmmrzju8q.php?GH56Gb1559907003482636799efdca6550ef4984c525ffe9482636799efdca6550ef4984c525ffe9482636799efdca6550ef4984c525ffe9482636799efdca6550ef4984c525ffe9482636799efdca6550ef4984c525ffe9&email=&error=

Phishing site

Phishing site

After inserting an email address you go to the password page

Phishing site

After you input your email address and password, you get told incorrect details and forwarded to an almost identical looking page where you can put it in again.

Phishing site

Punishing site

 

Then you get a page saying your voice message will be delivered in the next 30 minutes

Phishing site

Phishing site

 

And then you are redirected to https://www.youmail.com/home/feature/voicemail-to-email/  which tries to sell you various email / voice messaging services. I assume there must be a referral link embedded somewhere in the final redirect so the scammer gets a commission of some sort from this company.

After digging around a bit I found an Open Directory listing on the domain http://www.climbfinder.co.uk/wp-content/themes/bouquet/images/

open directory listing

open directory listing

This led to an additional copy of the same phish inside the http://www.climbfinder.co.uk/wp-content/themes/bouquet/images/hollar/  directory

And then a Chase Banking phish inside http://www.climbfinder.co.uk/wp-content/themes/bouquet/images/Online/ 

Fake Chase Bank phishing site

Fake Chase Bank phishing site

I also found a zip file which contains the complete Chase phishing scam complete with the scammers details.

The live.php appears to be the webshell that has allowed the compromise  to take place and allows complete access to the entire account & other sites on the server

webshell on compromised server

webshell on compromised server

We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”

Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.

 

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.

Email Headers:

Received: from mailserver.cmp.victimsdomain.com (unknown [10.44.166.67]) byamavis-21.cmp.victimsdomain.com (Postfix) with ESMTP id 3A39B407D84C for<This email address is being protected from spambots. You need JavaScript enabled to view it.>; Fri, 7 Jun 2019 11:02:31 +0100 (BST)Received: from amavis-21.cmp.victimsdomain.com ([127.0.0.1]) by localhost(amavis-21.cmp.victimsdomain.com [127.0.0.1]) (amavisd-new, port 10024) withESMTP for <This email address is being protected from spambots. You need JavaScript enabled to view it.>; Fri, 7 Jun 2019 11:02:31 +0100(BST)Received: from GBR01-CWL-obe.outbound.protection.outlook.com(mail-eopbgr110133.outbound.protection.outlook.com [40.107.11.133]) bymailserver.cmp.victimsdomain.com (Postfix) with ESMTPS id 29CE94043A for<This email address is being protected from spambots. You need JavaScript enabled to view it.>; Fri, 7 Jun 2019 11:02:31 +0100 (BST)Received: from LNXP265MB0297.GBRP265.PROD.OUTLOOK.COM([fe80::1c37:d364:c013:e0aa]) by LNXP265MB0297.GBRP265.PROD.OUTLOOK.COM([fe80::1c37:d364:c013:e0aa%4]) with mapi id 15.20.1965.011; Fri, 7 Jun 201910:02:22 +0000Received: from LNXP265MB0297.GBRP265.PROD.OUTLOOK.COM (10.166.183.146) byLNXP265MB1049.GBRP265.PROD.OUTLOOK.COM (20.176.130.140) with Microsoft SMTPServer (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id15.20.1965.14; Fri, 7 Jun 2019 10:02:23 +0000Received: from amavis-21.cmp.victimsdomain.com (xx.xx.xx.xx) byexch2-ht02.email2.local (10.44.216.67) with Microsoft SMTP Server id14.3.439.0; Fri, 7 Jun 2019 11:02:31 +0100Received: from localhost (unknown [127.0.0.1]) by amavis-21.cmp.victimsdomain.com(Postfix) with ESMTP id CD6D740304BF for <This email address is being protected from spambots. You need JavaScript enabled to view it.>;Fri, 7 Jun 2019 10:02:31 +0000 (UTC)From: “Vesselina Zlatareva” <This email address is being protected from spambots. You need JavaScript enabled to view it.>To: “Vesselina Zlatareva” <This email address is being protected from spambots. You need JavaScript enabled to view it.>Subject: Message From +44 875 10** **Date: Fri, 7 Jun 2019 11:02:22 +0100Message-ID: <This email address is being protected from spambots. You need JavaScript enabled to view it.>MIME-Version: 1.0Content-Type: multipart/alternative;boundary=”—-=_NextPart_000_3510_01D51D21.6F6601A0″X-Mailer: Microsoft Outlook 16.0Thread-Index: AQC+h+g6CZaXq816D4QPsf5xBtJtMw==Content-Language: en-us

Read more https://myonlinesecurity.co.uk/voicemail-phishing-scam-involving-compromised-onedrive-for-business-site/

Add comment

By entering a comment, if it is of a commercial nature, you will be auto enrolled in our customer care course as detailed in our rate card.
By entering a comment you legally agree to the course and to pay. Thanks


Security code
Refresh