On a daily basis, I’m looking for malicious emails. I ownÂ catch-all mailboxes that collect a huge amount of spam that I’m using to perform deeperÂ analysis: to discover new tactics used by attackers and new piece of malicious code. Basically, they are two categories of phishing campaigns: the one sent to a large base of potential victims and the one targeting only one victim (one person or one company). The first one has a very low ROI (“Return On Investment“) while the second one can be much moreÂ lucrative! Those are usually wellÂ prepared and can be very difficult to detect by regular users. On the other hand, common campaigns are easy to detect: they contain typo errors, they remain vague in their context and details. The content does not match the language or style used by the spoofed issuer. But, sometimes, it goes in the other way…
Today I received an e-mail from a well-known Belgian company. I contacted them during the weekend to request an invoice for the service (travel) that I ordered previously. I filled an online form, submitted my details. The feedback was “Thank you, we will send you more information via email.“.
Here is a copy of the received email:
For my non-French speaking readers, here is a quick translation:
Dear Sir, dear Madam,
Please find attached the invoiceÂ 31004105 you requested via our website.
If the document is incomplete or incorrect, or if you have other comments or questions, feel free to contact us by mail at xxx.
We hope to welcoming you on board one of our flights.
My first reaction was “Warning – Phishing ahead!”Â for the following reasons:
- The mail was sent in plain text
- The subject was a classic one for phishing attemps
- The sender name written in uppercase
- The attached document name was “.PDF.pdf” (wtf?)
- The messageÂ looked similar to many phishing attempts
Fortunately, the mail was an original. The mail path was correctÂ (checked via the SMTP headers), the attached PDF file was clean and contained references to the company (note: this can be also forgedÂ in a real phishing attack). According to LinkedIn, the sender was working for the company (this can also be forged with a fake profile).
While many companies are tryingÂ to improve their communication channels with their customers to protect them against phishing emails, how can we still receive such kind of emails in 2016? I would expect:
- A properly formatted email with the look and feel of the company
- More references to my order (name, dates, …)
- Complete contact information about the sender (at least a phone number)
- Avoid attachment like the plague! More and more mail gateways implement strong filters that could put valid emails in quarantine (prefer a unique URL which points to the document).
With companies sending such emails, I’m not surprised that people still fall in the phishing trap!Â Just my $0.02…