DHL Spear Phishing to Capture Username/Password

Published: 2022-02-13
Last Updated: 2022-02-13 14:16:53 UTC
by Guy Bruneau (Version: 1)
1 comment(s)

This week I got this run-of-the-mill DHL phishing in my ISC inbox. 

I have seen similar email from my personal email before. When I followed the URL for analysis, it automatically inserted my email address into the source email box and it included the SANS Technology Institute picture at the top of the page to make it look like I'm accessing the official website.

What I also found interesting about this phishing email, both message below LOGIN which would normally be link with a URL, had nothing associated with them.

Indicator

https://showpiece.trillennium[.]biz/linknew/firebase1.php
 

[1] https://www.virustotal.com/gui/url/8e307d79ecae2d57b2a306cac2a95f32f4afca21c5b7a61539af787c1a2f6a16?nocache=1
[2] https://isc.sans.edu/forums/diary/Spearphishing+Email+Targeting+Outlook+Mail+Clients/27472/

-----------
Guy Bruneau IPSS Inc.
My Handler Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

1 comment(s)

Comments

Hi Guy,

it seems to me this phishing was sent from your own domain (DHL@isc.sans.edu) that is protected against email spoofing by DMARC/SPF policies. If a homoglyph trick wasn't used, how they managed to pass it thru your inbound email gateway?

Jan S, DHL InfoSec

Diary Archives