{"id":66515,"date":"2014-09-17T11:00:05","date_gmt":"2014-09-17T11:00:05","guid":{"rendered":"http:\/\/kasperskycontenthub.com\/securelist\/?p=66515"},"modified":"2022-02-08T13:24:53","modified_gmt":"2022-02-08T13:24:53","slug":"scammers-delivery-service-exclusively-dangerous","status":"publish","type":"post","link":"https:\/\/securelist.com\/scammers-delivery-service-exclusively-dangerous\/66515\/","title":{"rendered":"Scammers’ delivery service: exclusively dangerous"},"content":{"rendered":"
Well-known companies and brands are favorite targets for fraudsters. After all, it is much easier to get people’s attention with the use of a popular name, so scammers have more chance of trapping a gullible user.<\/p>\n
In this article, we will analyze phishing and malicious emails sent by fraudsters that claim to come from international delivery services. The most popular of these are DHL (Germany), FedEx and United Parcel Service (USA), TNT (Netherlands). All of these companies are international, with millions of customers using branches in major countries all over the world. They provide similar services, so scammers use the same methods and techniques in their fraudulent mails.<\/p>\n\n
The phishers’ goals include:<\/p>\n
Structurally, the \u00a0address in the From field looks like this: Sender Name . To confuse recipients, scammers can change parts of the address and often make it look very similar to an official address of the delivery service.<\/p>\n
There are several groups of email addresses seen in fraudulent emails:<\/p>\n
<\/p>\n
<\/a><\/p>\n <\/p>\n <\/a><\/p>\n <\/p>\n <\/a><\/p>\n <\/p>\n <\/a><\/p>\n<\/ol>\n While analyzing sender address, remember that scammers do not need to hack the company servers to use the real company domain in the From field. They can simply insert the necessary domain name of the server into the From field.<\/p>\n The subject of the fraudulent mail should capture the imagination of recipients and encourage them to open the message, but it also needs to be plausible. Therefore spammers choose common phrases typical of official notifications from delivery services. After sending a parcel or a document, customers worry about its successful delivery and try to follow its progress by reading any notification from a delivery service.<\/p>\n The most popular subjects are:<\/p>\n Examples:<\/p>\n <\/a><\/p>\n Examples:<\/p>\n <\/a><\/p>\n <\/p>\n <\/a><\/p>\n<\/ol>\n Scammers pay special attention to the design of the email. Their main goal is to make message as believable as possible. After all, if it looks suspicious, a potential victim will most likely delete it despite the attractive subject and plausible sender address. Let’s analyze the basic techniques that fraudsters use to make emails look legitimate.<\/p>\n All major international companies have their own corporate style, including wordmarks, graphic trademarks, corporate fonts, slogans and color schemes. These are used on the official website, in mailings and commercials, and in other design components. Scammers use at least some of these elements when designing fraudulent emails to make them look convincing. Usually phishers focus on logos because these elements are unique to each company and is an immediate identifying mark.<\/p>\n Examples of DHL company logos used in fraudulent emails.<\/p>\n <\/a><\/p>\n Let’s take a closer look at these examples. It’s immediately obvious that the second example is very different from the company’s official logo. Another sign of a forgery is the difference in size between the false logo and the original, as seen in the fourth example where the logo takes almost a third of the message. Here the plan is probably to attract the reader’s attention with a large bright picture rather than plain text. That also explains why the phishing links appear in a larger font: users should respond to it immediately, without trying to read the small print.<\/p>\n In the first example, the scammers are trying to copy the design from the official site (a very popular method). However the logo is placed on the right-hand side rather than on the left. Also they are using a color blend for the logo background rather than making it single-color. The logo in the third example most closely imitates the original DHL logo: the scammers have tried to match its size and design. It’s not really all that difficult to make a logo for a fake notification: there are plenty of versions of the original image available online in several formats, including vector graphics. In addition to the logo the fraudsters use the color spectrum chosen by the company in its official resources and mailings. For example, for DHL it is a combination of yellow and red.<\/p>\n In most official emails we find a number of set phrases, especially when it comes to standard notifications generated and sent automatically. These messages often include contacts and links to the official resources of the sender. Therefore, to make the text of the fake email look like an original notification from a delivery service the fraudsters use:<\/p>\n <\/p>\n <\/a><\/p>\n <\/p>\n <\/a><\/p>\n <\/p>\n <\/a><\/p>\n<\/ol>\n When fraudsters send out fake emails convincing readers that it is a real message is only part of the battle. The next step is to persuade the potential victim to do what the scammer requires, such as providing personal information or installing a malicious file. This is where psychology comes into play, and the email content is the main tool.<\/p>\n In fraudulent notifications allegedly sent on behalf of delivery services often use the following tricks:<\/p>\n <\/p>\n <\/a><\/p>\n The scammers use deadlines like this to make recipients react immediately. The phishers hope that users will be so worried about losing the parcel or paying extra costs that they won’t hesitate to provide personal details or open a suspicious attachment.<\/p>\n <\/a><\/p>\n Users are unlikely to open unknown attachments or follow unknown links. That’s why scammers imitate official websites and present malware as a document with information a parcel. In addition, if the text of the notification states that the attachment contains, for example, a consignment document, the malicious archive will have a similar name, such as “consignment.zip.” This applies to phishing links as well – scammers name their links with an appropriate phrase from the text, such as “shipping information”.<\/p>\n This simple trick is intended to reassure recipients that the attachment or link is perfectly legitimate.<\/p>\n <\/a><\/p>\n Assuming the fraudsters have convinced the recipients that the email is real, the next step is to tell the victims how to solve their problems. Fulfilling these instructions is the ultimate goal of the fraudulent email. Here it is important for the scammers not just to tell recipients what they need to do, but to make them understand correctly what is written in the message. To avoid any misunderstanding on the part of the recipients, messages often contains detailed instructions about what to do.<\/p>\n <\/a><\/p>\n<\/ol>\n Cheating the user is not the only thing scammers have to do. They also need to bypass spam filters and deliver the email to the email boxes of potential victims. One of the most popular and long-used methods to bypass filtering is to change text fragments within the email. Modern programs designed to send out spam messages include ample opportunities to generate multiple changes in the text. The text of a message which varies from email to email makes the email unique, while different personal information specified within one mailing (such as the number of the shipment, the form of the address, the dates) helps to convince recipients that the email is intended for them. In addition, the fraudsters can send out emails designed in the same style for several months – they only need to change some elements in the text.<\/p>\n Fraudulent notifications from delivery services can change:<\/p>\n Let’s analyze some examples of changes in the text of fraudulent emails.<\/p>\n <\/a><\/p>\n Below are some emails from yet another mass mailing.<\/p>\n <\/a><\/p>\n To steal personal information from users, scammers create phishing HTML pages which partially or completely copy the official website of a company. If victims of fraud enters their personal information (bank details, usernames and passwords) on this page, that data immediately falls into the fraudsters’ hands.<\/p>\n To mask the links leading to phishing websites the fraudsters often use popular free URL shorteners. In addition, most services offer customers the ability to view the statistics on the short link which tells fraudsters more about the number of clicks on any links etc. Phishing pages can be located on specially registered domains which usually have a short life span as well as on compromised domains whose owner may not even be aware that the web site is being used for fraudulent purposes.<\/p>\n Let’s analyze a fake email sent on behalf of FedEx in which recipients are asked to update their account information. The text of the email contains a link to the official website of the company while the real address to which the user is redirected is nothing like the legitimate page and is located on a free URL shortener service. This becomes obvious when you hover on the link.<\/p>\n <\/a><\/p>\n After clicking the link, users get to a fraudulent page imitating the official website of FedEx, where they are asked to enter their logins and passwords to access their accounts. Once the users fill in the fields and click “Login”, the entered information is transmitted to the scammers who can then access the victims’ personal accounts. The menu tabs and other links on the phishing page are often inactive, so clicking on them will not take users to the appropriate page. However, in some cases, phishers imitate all links on the page so that users do not have any doubt about its legitimacy. Sometimes the design of the page imitates the official site but does not copy it completely. If you have a closer look at the details, you will see some differences between the designs of the real and the fake pages. However, most users do not pay attention to small details and this carelessness helps the scammers to steal personal information.<\/p>\n <\/a><\/p>\n Below is yet another example of an email sent on behalf of FedEx. This time it contains a malicious link.\u00a0 The email informs recipients that delivery is impossible because of missing information. And now users have to follow the specified link for verification.<\/p>\n <\/a><\/p>\n The link leads to a fraudulent page where potential victims are invited to download a program that will supposedly check whether they are really going to receive a parcel. Naturally, the program turns to be the well-known Zeus Trojan, which helps the fraudsters to access the computer and all the personal information on it.<\/p>\n <\/a><\/p>\n Scammers might not only include a phishing link in the body of the email, but also attach an HTML phishing page designed to steal personal data. However this use of HTML attachments as phishing pages is unusual for fraudulent mailings sent on behalf of delivery services.<\/p>\n To increase the audience of recipients and customers, spammers are mastering new languages. In addition to traditional English and German, current spam traffic includes emails in Hebrew, Albanian and other languages\u200b\u200b which were found in advertising and fraudulent mailings a few years ago. For example, you may come across fake notifications from international delivery services written in Italian and Dutch. These emails do not have any special features that distinguish them from English- or German-language messages – to cheat users, the fraudsters resort to the same tricks.<\/p>\n For example, this Italian-language fake notification from FedEx tells users to confirm their identity by following a fraudulent link.<\/p>\n <\/a><\/p>\n Yet another mass mailing in Italian contained a malicious archive which included the Zeus\/Zbot Trojan used to steal personal data. The fraudulent email claimed that the user profiles on the website had been updated and there was more detailed information about it in the archive.<\/p>\nThe Subject field<\/h3>\n
\n
The design of the email<\/h2>\n
Graphic design<\/h3>\n
The text design<\/h3>\n
\n
The content of the email<\/h2>\n
\n
How the text might change<\/h3>\n
\n
Fake pages<\/h3>\n
Fraudulent emails in different languages<\/h3>\n