Legal Threats Make Powerful Phishing Lures
Thanks to KrebsOnSecurity who would like to thank Hold Security for a heads up on this phishing kit.

Legal Threats Make Powerful Phishing Lures

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued and instruct them to review the attached file and respond within a few days — or else. Here’s a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harbouring malware.

On or around May 12, at least two antivirus firms began detecting booby-trapped Microsoft Word files that were sent along with some various of the following message:

{Pullman & Assoc. | Wiseman & Assoc.| Steinburg & Assoc. | Swartz & Assoc. | Quartermain & Assoc.}

Hi,

The following {e-mail | mail} is to advise you that you are being charged by the city.

Our {legal team | legal counsel | legal department} has prepared a document explaining the {litigation | legal dispute | legal contset}.

Please download and read the attached encrypted document carefully.

You have 7 days to reply to this e-mail or we will be forced to step forward with this action.

Note: The password for the document is 123456

The template above was part of a phishing kit being traded on the underground, and the user of this kit decides which of the options in brackets actually get used in the phishing message.

Yes, the spelling/grammar is poor and awkward (e.g., the salutation), but so is the overall antivirus detection rate of the attached malicious Word document. This phishing kit included five booby-trapped Microsoft Word documents to choose from, and none of those files are detected as malicious by more than three of the five dozen or so antivirus products that scanned the Word docs on May 22 — 10 days after they were spammed out.

According to both Fortinet and Sophos, the attached Word documents include a trojan that is typically used to drop additional malware on the victim’s computer. Previous detections of this trojan have been associated with ransomware, but the attackers, in this case, can use the trojan to install malware of their choice.

Also part of the phishing kit was a text document containing some 100,000 business email addresses — most of them ending in Canadian (.ca) domains — although there were also some targets at companies in the north-eastern United States. If only a tiny fraction of the recipients of this scam were unwary enough to open the attachment, it would still be a nice payday for the phishers.

The law firm domain spoofed in this scam — wpslaw.com — now redirects to the Web site for RWC LLC, a legitimate firm based in Connecticut. A woman who answered the phone at RWC said someone had recently called to complain about a phishing scam, but beyond that the firm didn’t have any knowledge of the matter.

As phishing kits go, this one is pretty basic and not terribly customized or convincing. But I could see a kit that tried only slightly harder to get the grammar right and more formally address the recipient doing quite well: Legitimate-looking legal threats have a way of making some people act before they think.

Don’t be like those people. Never open attachments in emails you were not expecting. When in doubt, toss it out. If you’re worried it may be legitimate, research the purported sender(s) and reach out to them over the phone if need be. And resist the urge to respond to these spammers; doing so may only serve to encourage further “malicious” correspondence.


Thanks to KrebsOnSecurity who would like to thank Hold Security for a heads up on this phishing kit.


要查看或添加评论,请登录

Robert de Haan的更多文章

  • Psychological and Security issues when working from home

    Psychological and Security issues when working from home

    Have you ever wondered what are the psychological risks and cyber security impacts are, that we encounter when our…

    1 条评论
  • The paradox of our time in history.

    The paradox of our time in history.

    · We have taller buildings but shorter tempers, wider Freeways, but narrower viewpoints. We spend more but have less…

  • Paying it Forward

    Paying it Forward

    In this time of life-altering change, Layer 8 Security is offering to assist any company with a complementary offer to…

    1 条评论
  • FREE “Working remotely” online security course

    FREE “Working remotely” online security course

    To assist organisations to address the potential risk of staff working from home, Layer 8 Security are offering a FREE…

  • How to quickly change security behaviour

    How to quickly change security behaviour

    Security awareness training aims not only to impart information but also to change behaviour. In order to accomplish…

    1 条评论
  • A habitually funny story.

    A habitually funny story.

    I was running a security awareness training session for some executives of one of our customers recently, when I put up…

  • Addressing Human Risk

    Addressing Human Risk

    Addressing human risk, compliance and appropriate controls isn’t as easy as just doing some email phishing, some…

  • Building a better security culture

    Building a better security culture

    Everyone knows how crucial security is and how it must be embedded into everything an organization does. A simple…

    1 条评论
  • How Can Companies Nip Employee Negligence in the Bud?

    How Can Companies Nip Employee Negligence in the Bud?

    By David Bisson and edited by Robert de Haan Employee negligence continues to be a top information security risk for…

  • Opinions on security predictive behaviour

    Opinions on security predictive behaviour

    I’m sure you heard the theme many times over the past few years that the best ROI for cybersecurity spend, comes from…

    2 条评论

社区洞察

其他会员也浏览了