At CudaMail, we've noticed lately that the recent wave of "Shipping-related" spam has been increasing. You know the ones - "Package Tracking Details", "Fedex Shipment Details" or "Express Tracking Notification". If you regularly deal with these companies it may not come as a surprise, but if you're not expecting a shipment, you may be thinking of clicking on the links to check this "shipment". As usual, it's a good idea to not click the links! Try logging into your account on their actual website, or call them to check. With the coming Holidays, it's only natural to expect some shipments - and the spammers are taking advantage of this, and even dropping names like "Amazon" or major store names to try and lure you to click on their links and load their malware on your computer. - Take care when reading these emails, and be careful what you click on. Tuesday, November 15, 2011
Shipping Related Spam Increase for the Holidays
At CudaMail, we've noticed lately that the recent wave of "Shipping-related" spam has been increasing. You know the ones - "Package Tracking Details", "Fedex Shipment Details" or "Express Tracking Notification". If you regularly deal with these companies it may not come as a surprise, but if you're not expecting a shipment, you may be thinking of clicking on the links to check this "shipment". As usual, it's a good idea to not click the links! Try logging into your account on their actual website, or call them to check. With the coming Holidays, it's only natural to expect some shipments - and the spammers are taking advantage of this, and even dropping names like "Amazon" or major store names to try and lure you to click on their links and load their malware on your computer. - Take care when reading these emails, and be careful what you click on. Tuesday, August 30, 2011
How a LinkedIn notice could empty your bank account
How a LinkedIn notice could empty your bank account
We see a lot of spam at Barracuda Labs. Sometimes they're as simple and straightforward as a Viagra ad, but just as often they can be as serious and as devastating as an urban mugging. We've been watching one of those muggings play out over the past few days, and it has reminded us that spam is nothing to take lightly. Early on the morning of August 23 the spam monitors at Barracuda Labs started detecting a large number of emails claiming to be from LinkedIn. The quantities were significant, tens of thousands an hour, and these were pretty convincing messages.
As convincing as they may be these emails have nothing to do with LinkedIn. The from address is fake and the "Follow this link" hyperlink leads to one of a set of recently registered domains deliberately set up to serve malicious content
Most of these sorts of spam attacks simply link to a malware file which the browser then downloads and offers to run. If an antivirus doesn't intercept such a file then Windows will ask for permission to run it and it is easy enough to say no. But this attack is different and much more serious. Each of the malicious domains such as linkedin-reports.com or linkedin-alert.com hosts an exploit kit, a set of malicious payloads that quietly attempt to take advantage of weaknesses in the Web browser and its helper applications. Clicking on the "follow this link" hyperlink in the message doesn't appear to have any effect. Nothing seems to happen; however there is a lot going on behind the scenes. Below is what the behind-the-scenes network traffic looked like. This traffic capture shows a series of attacks against Internet Explorer (1), against the Adobe PDF reader plug-in (2) and finally against Windows Media Player (3). Eventually these exploits result in the download of Trojan.Jorik (4). Trojan.Jorik is a password stealer which gets right to work, periodically checking in with its command and control server (5). After contacting the control server the Trojan contacts another server (6) for an interesting – and somewhat scary – configuration file. These password-stealing Trojans are programmed to insert themselves into the browser stack and can intercept login pages even before they are encrypted by HTTPS. The list above shows the services that the Trojan is being configured to monitor. There is more configuration that is not shown in this graphic – pages of HTML code snippets to be injected into login pages. When a login page for one of the monitored sites is displayed, the corresponding code snippet is added to the page. These code snippets ask for additional security questions or special passwords, information the password thieves want but questions that the legitimate login page does not ask. Having your online banking credentials stolen is serious stuff, especially if the credentials belong to an organization or business with a hefty bank balance. Consider the most recent story from Brian Krebs about the Cyber Theft of $217,000 from a nonprofit in Nebraska. With so much spam circulating through email servers worldwide, it is easy to become insensitive to the very real danger that truly malicious spam poses. Never let down your guard, and never ever follow links in emails even if they appear to be official looking. As you can see from this example, one click can be all it takes. Thursday, June 23, 2011
Top 5 Things to Know Before Choosing a Spam Filtering Service
Thursday, June 2, 2011
US-Cert Reports Gmail Phishing Attack
US-Cert recently published an article about a new phishing attack, which is aimed as specific targets in the US Government.
The Story:
US-CERT is aware of public reports of a phishing attack that specifically targets US government and military officials' Gmail accounts. The attack arrives via an email sent from a spoofed address of an individual or agency known to the targeted user. The email contains a "view download" link that leads to a fake Gmail login page. The login information is then sent to an attacker. Google has indicated that this phishing campaign has been disrupted and that affected parties have been notified.
- US-CERT encourages users and administrators to do the following to help mitigate the risks:
- Review the Google blog entry Ensuring your information is safe online.
- Do not follow unsolicited web links or attachments in email messages.
- Use caution when providing personal information online.
- Verify the legitimacy of the email by contacting the organization directly through a trusted contact method.
- Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams.
- Refer to the Avoiding Social Engineering and Phishing Attacks document for more information on social engineering attacks.
- Refer to the Using Caution with Email Attachments document for more information on safely handling email attachments.
Relevant Url(s):
http://www.us-cert.gov/cas/tips/ST04-014.html
http://www.us-cert.gov/reading_room/emailscams_0905.pdf
http://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html
http://www.us-cert.gov/cas/tips/ST04-010.html
Original Article: http://www.us-cert.gov/current/index.html#gmail_phishing_attack
Friday, March 18, 2011
Ongoing Phishing Attack targeting PayPal, Bank of America, Lloyds and TSB
The US-CERT Story:
US-CERT is aware of public reports of an ongoing phishing attack. At this time, this attack appears to be targeting PayPal, Bank of America, Lloyds, and TSB users. The attack arrives via an unsolicited email message containing an HTML attachment.
This attack is unlike common phishing attacks because it locally stores the malicious webpage rather than directing user to a phishing site via a URL. Many browsers utilize anti-phishing filters to help protect users against phishing attacks, this method of attack is able to bypass this security mechanism. US-CERT encourages users and administrators to take the following measures to protect themselves from these types of phishing attacks: - Do not follow unsolicited web links or attachments in email messages.
- Use caution when providing personal information online.
- Verify the legitimacy of the email by contacting the organization directly through a trusted contact method.
- http://www.us-cert.gov/cas/tips/ST04-014.html
- http://www.us-cert.gov/reading_room/emailscams_0905.pdf
- http://www.us-cert.gov/cas/tips/ST04-010.html
Tuesday, March 15, 2011
Japan EarthQuake and Tsunami Email Scams
We see it all the time. Spammers and malware writers try to exploit all kinds of traumas and disasters. The recent earthquake and tsunami disasters in Japan are no exception - so the anti-spam community should be prepared for the onslaught.
US-CERT recently posted a warning about impending Phishing and Malware email scams regarding Japan's recent earthquake and the resulting tsunami disaster:
- original story below:
US-CERT Current Activity
Japan Earthquake and Tsunami Disaster Email Scams, Fake Anitvirus and Phishing Attack Warning
Original release date: March 11, 2011 at 10:14 am Last revised: March 11, 2011 at 10:14 am
US-CERT would like to warn users of potential email scams, fake antivirus and phishing attacks regarding the Japan earthquake and the tsunami disasters. Email scams may contain links or attachments which may direct users to phishing or malware-laden websites. Fake antivirus attacks may come in the form of pop-ups which flash security warnings and ask the user for credit card information. Phishing emails and websites requesting donations for bogus for charitable organizations commonly appear after these types of natural disasters.
US-CERT encourages users to take the following measures to protect themselves:
- Do not follow unsolicited web links or attachments in email messages.
- Maintain up-to-date antivirus software.
- Review the Federal Trade Commission's Charity Checklist.
Verify the legitimacy of the email by contacting the organization directly through a trusted contact number. Trusted contact information can be found on the Better Business Bureau National Charity Report Index.
You can find the original story here.

