The other day, I got this cryptic email. It read:
From: Wayne Millbrand <email@example.com>
Date: 03/27/2017 2:23 PM (GMT-05:00)
Good day to you!
I have a rather delicate issue, which touches directly to you. Don’t be surprised how do I learned about you! The fact is that I have got already a second letter from the person, I do not know which asserts that you are fraud involved. He insists, that you forced him transfer funds on your PayPal account under fictional reason. However,with this information he pointed out your private data up to address:
First Last Name
State (with capitalization error)
Now he is collecting information and planing to contact the police. I advise you to view the information that he sent to me. I have attached Fine.doc with a copy of all of his messages.
Document was password-protected – 4299
Please explain to me what’s happening. I hope that all of this is a silly misunderstanding.
Based on the fake email address and the tell-tale Anguished English, I concluded that this was just another phish.
I usually delete these emails promptly, but this one had an interesting component to it: it came with a password protected MS Word document. This is somewhat unusual because they typically expect you to just launch the attachment and activate the payload immediately.
So it appears that the attack strategy was to:
- Send a threatening email
- Add some publicly available information about the recipient to make it look genuine
- Encrypt the document in order to hide the payload from an anti-virus scanner
- Provide the password in the email to allow the user to open and decrypt the file
- Activate the payload in the MS Word document and infect the user’s machine
Inside the encrypted Word document, I found the following API declarations, variable names, and this code:
Dim wyqud As String
Dim zdwie As Long
Dim rufhd As Long
Dim bldos As Integer
Dim mufid () As Byte
Dim kmvbf As Long
Dim dfety As Long
Dim bvjwi As Long
Dim wbdys As Long
Dim dvywi (256) As Byte
Dim wdals As Long
Dim dwiqh As Long
API Declarations and Variables
This seems to be a variation on an old theme where as soon as the user opens the file, the routine executes a URL file download from one of these two backup sources:
h t t p://adenzia.ch/_vti_cnf/bug.gif
h t t p://kingofstreets.de/class/meq.gif
The macro is quite sophisticated, it can even prompt the user to disable their firewall if the download fails. Both GIFs—despite having an appropriate header block and some image content bytes—actually carry the encoded malware.
The macro uses a subroutine to extract the executable binary from the downloaded GIF. It stores the binary in a temp file, appends an “exe” extension to it, and then using the Explorer function ShellExecuteA, executes it in order to install additional malware. In this case, it was ransomware that encrypted the Documents folder.
The installed ransomware in action
Interestingly, the first compromised URL used by the malware was website that belongs to Adenzia.ch, a Swiss accounting and corporate services firm that ironically advertises itself as providing “Privacy and secure Data storage” and:
– Accounting services
– Secure financial services
– Data entry from paper to digital
– Scanning paper data to digital
– Archiving data anonymously
The before and after the breach Adenzia.ch websites
The Kingofstreets.de website
Another noteworthy strategy is that both, the repurposed Swiss Adenzia.ch financial site as well as the second German kingofstreets.de gaming site required a login. This provides an additional layer of security by preventing internet security scanners from tracking down the payload by trying to follow a link to the malware.
From the variable naming convention and the language of the email itself, it seems that the writer is non native English speaker. The metadata from the Word document further supports this and suggest a strong link to a Russian origin. First, the author’s name was preserved as виньда (Vinda) and the company name came up as: SPecialiST RePack.
SPecialiST RePack is a Russian digital publisher that is used for repackaging software. According to Emsisoft malware database, they are a source of a large number of infected files and products.
SPecialiST RePack infected content
As far as the unfortunate Adenzia.ch site, it seems that it was breached in the past few months as the Wayback Machine still shows them operational on October 4, 2016.
I’ve tried to contact Adenzia and give them heads up that they need to have a look at their network. As of this date, I haven’t heard back from them. This could be an indication that either the site was a front for malware distribution from the get go or else it is no longer in business and has been abandoned.
© Copyright 2017 Yaacov Apelbaum, All Rights Reserved.
I recently received an email claiming to be from Microsoft Live. The email stated that due to some processing issues, they could not authorize my credit card and so I would need to login to their website to update my credit card information by clicking on their link.
Over the years, I have seen a number of these types of messages, but this was the first one targeting me personally. After skimming through it, I realized that it was a blatant phishing attempt, nevertheless, I still marveled at the ingenuity of the scammers.
Billing and Account Management
Dear Windows Live Hotmail member,
During our regularly scheduled account maintenance and verification procedures, our billing department was unable to authorize your current payment method information.
This might be due to either of the following reasons:
- A recent change in your personal information (i.e. change of address, credit card)
- Submitting invalid information during the initial Sign Up or upgrade process.
- An inability to accurately verify your selected payment method information due to an internal error within our processors.
Please use the following link to update your payment method information :
The above link may have been blocked for your privacy. To activate the link please look for the Show content link that is usually located on top of this message.
NOTE! If your account information is not updated within 48 hours then your ability to use your Windows Live Hotmail account will become restricted.
Thank you for using Windows Live Hotmail!
Please do not reply to this e-mail, as this is an unmonitored alias.
© 2009 Microsoft Corporation. All rights reserved.
Anatomy of a Phish
For the uninitiated, phishing (pronounced “fishing”) is a fraudulent attempt to acquire sensitive information from a user. Such information can be: credit cards, user IDs, passwords, and/or account information. It is often accomplished via email or phone.
Phishing falls into the category of exploits known as “ “social engineering”. Even though they are mostly low tech, (requiring neither sophisticated technology nor advanced programming), they can to be successful (especially the well executed and new exploits) because most people tend instinctively to do what they are told and will not challenge the authority and authenticity of what seems to be an official correspondence.
In a typical phishing scenario, the perpetrators (usually located offshore) send a simple email—claiming to be from the customer service department of a recognizable organization (like a bank, on-line service, etc.)—the email will inform you of some problem with your account. You are then instructed to provide details of your bank, email, or credit card account in order to correct this problem.
Even though, phishing exploits can have many variations, they can be grouped into the following are five usage scenarios:
1. Forged identities — In this exploit, the attacker creates an email address that is related to a reputable organization like “Windows Live Customer Support”. Even though on the surface, their email address looks legitimate (as in: firstname.lastname@example.org), it is not. If you’re not paying attention, it can be easy to mistake a message like this for a genuine customer support request.
2. Compromised accounts — In this exploit, the attacker uses a compromised user account to send an email to everyone in the address book for that account. An email you receive from a known account dramatically increases the credibility of that message, and therefore the likelihood of a successful phishing attack.
3. Direct phone calls — In this exploit, the scammer may contact you directly by phone, telling you that they work for some financial institution (may offer to lower your interest rates) or the fraud investigation departments. They will inform you that your account has been breached and will directly ask you for your account details in order to verify it.
4. Bogus websites — In this exploit, the attacker will send you a link to what seems to be a functional website. The site will include official-looking logos, language, or other identifying information taken directly from a legitimate websites. The address of the site will show resembles the name of a reputable company but with some spelling variations. For example, the name"microsoft.live.com" could appear instead as: “micorsoft.live.com”
5. Social Network Harvesting — In this exploit, a communication from a scammer will ask you for personal information. You may mistake it for an email from a friend wanting to reconnect. The email will include convincing details about your personal life which ware recovered from social networks such as LinkedIn, Facebook, etc.
In general, the objective of phishing is to recover your webmail credentials since the resale value of a legitimate web mail account on the black market can be as high as $2-$3—twice the amount they could get for a stolen credit card number. So for a phisher, breaching several dozens accounts a day can be a lucrative business, making $100K-$500K for the life of the scam.
In the case of my phishing email, when I followed the link in it, I was taken to a credit card entry form (Image 1). As I expected, the form looked genuine, it had all the right corporate trimmings: a Microsoft logo, copyright notice, and even a link to a help page (which ironically offered the following advice “You should keep this number secret, protect it, and never write it on your card.”)
Image 1: Phishing Credit Card Entry Form
As with most phishing sites, I was expecting to find some bogus or misspelled Microsoft URL, but instead I was surprised to see that the web address of the webpage actually belonged to a company called Human & Technology H&T (Image 2), clearly, htech21.com doesn’t even sound like Microsoft. I’ve checked the parent URL out and It turns out, that this company was at one point a legitimate Korean hardware manufacturer, than, two years ago, their CEO was arrested and the company became the target of one of the biggest class-action lawsuits in history.
So what is the connection between htech21.com and this phishing expedition? It appears that the perpetrators of this scam decided to cut some costs and instead of purchasing and hosting their own domain, they chose to break into the H&T corporate web site and place their credit card collection pages on it. At one point, our scammers discovered that Human & Technology has gone out of business (this could also have been an inside job) and safely assumed that this orphaned website (which has not been updated for 3 years) is no longer being maintained or monitored, and as such, was a perfect staging platform for a phishing operation.
It is also interesting to note, that the site’s help file focused on ATMs (Automated Teller Machines), strongly suggests that at least some of the phishing website contents have also been used in other scams.
Image 2: Phishing Host Website
It is hard to recognize legitimate customer service communications from phishing expeditions. This difficulty if further compounded by the fact that for many, using services such as Amazon, EBay, and e-banking has now become a a way of life. For most users, the potential inconvenience of being looked out of their favorite on-line services outweighs the risk of disclosing their account information. Unfortunately, the on-line services are not helping this situation either because most are either impossible to reach by phone or their offshore support centers are largely useless.
So how does one survive in the hostile jungle of email exploits? The following are my top 10 Do’s and Don’ts of email:
1. Do Not open emails that have a wrong or incorrect spelling of your name. Phishers often harvest email addresses in balk and may not have your full name. Because of this, they will try to guess your name from your email address.
2. Do Not open emails that are not addressed to you by name. Phishers will almost never personalize correspondences; they will refer to you as “Dear Customer” or “Dear Valued Customer” because they send balk solicitations to millions of email addresses.
3. Do Not respond to any account management email requests that come from your bank. If your bank needs to reach you, they will send you an official letter or leave you a voice mail with a valid callback telephone number.
4. Do Not open unsolicited emails. Nothing in life is free, this includes the invitation to view naked celebrities and the Prozac and Viagra offers in your inbox.
5. Do Not use email links to go to any financial websites. Type in the URL yourself and save it as a bookmark.
6. Do verify the website URL you are about to log into, check the spelling carefully before you provide your login details on any web page. Pay close attention to domain name following the “http://” section of the address. Many phishers will Intentionally create very long names to obfuscate the fake URL.
7. Do log in to your on-line accounts regularly and look for unrecognized transactions. Do the same with your monthly credit card statements.
8. Do Not send your account details via email to anyone. email traffic is unencrypted, so anyone on route can intercept the message.
9. Do check that the Internet connection you are using is secure. Look for HTTPS in the address field of your browser. You may also want to click on thepadlock to view the actual server certificate. This will help you verify that it was issued by a reputable authority and assigned to the company managing the website in question.
10. Do make sure that you have an updated anti-virus software and that your firewall is turned on.
© Copyright 2009 Yaacov Apelbaum All Rights Reserved.