{"id":26156,"date":"2020-08-08T11:46:51","date_gmt":"2020-08-08T06:16:51","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=26156"},"modified":"2020-08-08T11:46:51","modified_gmt":"2020-08-08T06:16:51","slug":"fake-e-mail-scanner","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/fake-e-mail-scanner\/","title":{"rendered":"Fake e-mail scanner"},"content":{"rendered":"<p class=\"c-article__author-name\"><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">By <a href=\"https:\/\/www.kaspersky.com\/blog\/author\/tatyanashcherbakova\/\">Tatyana Shcherbakova<\/a> | Source: Kaspersky<\/span><\/p>\n<p class=\"c-article__title\"><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt; color: #000080;\">A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.<\/span><\/p>\n<div class=\"c-article__intro\">\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">In recent years, news about e-mail-based infections of corporate networks has been fairly regular (and generally connected with ransomware). So, it\u2019s no surprise that scammers periodically use the topic to try to extract credentials for corporate mail accounts by persuading company employees to run a scan of their mailbox.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">The ploy is aimed at people who know about the potential threat of malware in e-mail but have insufficient understanding of how to deal with it. Infosec personnel would do well to explain the tricks to employees and use such examples to illustrate what employees should look for to avoid falling victim to cybercriminals.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt; color: #000080;\">Phishing e-mail<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">This scam message employs the time-honored trick of victim intimidation. You can see it right in the header, which reads \u201cVirus Alert\u201d followed by three exclamation points. However trifling punctuation may seem, it\u2019s the first thing that should tip off the recipient that something may be wrong. Unnecessary punctuation in a work e-mail is a sign of drama or unprofessionalism. Either way, it\u2019s inappropriate in a notification supposedly intended to convey information about a threat.<\/span><\/p>\n<p class=\"c-article__image-container\"><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><a class=\"c-article__image-link\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/08\/06075757\/phishing-email-scanner-letter.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-36663 loading\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/08\/06075757\/phishing-email-scanner-letter.png\" alt=\"Phishing letter\" data-was-processed=\"true\" \/><\/a><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">The number one question the recipient should ask is: Who sent the message? The e-mail states that failure to act will result in the recipient\u2019s account being blocked. It might be logical to assume that it was sent either by the IT service that supports the corporate mail server or by employees of the mail service provider.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">But it\u2019s important to understand that no provider or internal service would require user action to scan the contents of the mailbox. Scanning takes place automatically on the mail server. Besides, \u201cvirus activity\u201d rarely occurs inside an account. Even if someone did send a virus, the recipient would have to download and run it. Infection happens on the computer, not in the mail account.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Coming back to that first question, a look at the sender raises two immediate red flags. First, the e-mail was sent from a Hotmail account, whereas a legitimate notification would display the domain of the company or provider. Second, the message is said to come from the \u201cEmail Security Team.\u201d If the recipient\u2019s company uses a third-party mail service provider, its name is bound to appear in the signature. And if the mail server is in the corporate infrastructure, the notification will come from in-house IT or the infosec service \u2014 and the chances of an entire team being responsible solely for e-mail security are minimal.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Next is the link. Most modern e-mail clients show the URL hidden behind the hyperlink. If the recipient is urged to click through to an e-mail scanner hosted on a domain that belongs to neither your company nor the mail provider, it is almost certainly phishing.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt; color: #000080;\">Phishing site<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">The site looks like some kind of online e-mail scanner. For the appearance of authenticity, it displays the logos of a host of antivirus vendors. The header even boasts the name of the recipient\u2019s company, which is meant to remove any doubt about whose tool it is. The site first simulates a scan, then interrupts it with the ungrammatical message \u201cConfirm your account below to complete Email scan &amp; delete infected all files.\u201d The account password is required for that, of course.<\/span><\/p>\n<p class=\"c-article__image-container\"><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><a class=\"c-article__image-link\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/08\/06075909\/phishing-email-scanner-yourcompany.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36664 loading\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/08\/06075909\/phishing-email-scanner-yourcompany.png\" alt=\"Phishing scanner interface\" width=\"1186\" height=\"646\" data-was-processed=\"true\" \/><\/a><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">To ascertain the nature of the site, start by examining the contents of the browser address bar. First, as mentioned above, it\u2019s not on the right domain. Second, the URL most likely contains the recipient\u2019s e-mail address. That in itself is fine \u2014 the user ID could have been passed through the URL. But in case of any doubt about the site\u2019s legitimacy, replace the address with arbitrary characters (but keep the @ symbol to maintain the appearance of an e-mail address).<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Sites of this type use the address passed by the link in the phishing e-mail to fill in the blanks in the page template. For the sake of the experiment, we used the nonexistent address victim@yourcompany.org, and the site duly substituted \u201cyour company\u201d into the name of the scanner, and the entire address into the name of the account, whereupon it appeared to start scanning nonexistent attachments in nonexistent e-mails. Repeating the experiment with a different address, we saw that the names of the attachments in each \u201cscan\u201d were the same.<\/span><\/p>\n<p class=\"c-article__image-container\"><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><a class=\"c-article__image-link\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/08\/06080141\/phishing-email-scanner-scanning.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36665 loading\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/08\/06080141\/phishing-email-scanner-scanning.png\" alt=\"The fake scanner site is simulating a scan\" width=\"1224\" height=\"634\" data-was-processed=\"true\" \/><\/a><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Another inconsistency is that the scanner supposedly scans the contents of the mailbox without authentication. Then why does it need the password?<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt; color: #000080;\">How to protect your employees from phishing<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">We have analyzed in detail the signs of phishing in both the e-mail and the fake scanner website. Simply showing this post to employees will give them a rough idea of what to look for. But that is just the tip of the proverbial iceberg. Some fake e-mails are more sophisticated and harder to sniff out.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Therefore, we recommend continuous awareness training for employees about the latest cyber threats \u2014 for example, using our <a href=\"https:\/\/k-asap.com\/en\/?redef=1&amp;THRU&amp;reseller=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Automated Security Awareness Platform<\/a>.<\/span><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By Tatyana Shcherbakova | Source: Kaspersky A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims. In recent years, news about e-mail-based infections of corporate networks has been fairly regular (and generally connected with ransomware). So, it\u2019s no surprise that scammers periodically use the topic to try [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":26157,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,16],"tags":[13566,13565,13567],"class_list":{"0":"post-26156","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-tech-knowledge","9":"tag-fake-e-mail-scanner","10":"tag-phishing-e-mail","11":"tag-phishing-site"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/26156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=26156"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/26156\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/26157"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=26156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=26156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=26156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}