Clearly a scam, but...
 

Clearly a scam, but how have they done this..?

30 Posts
13 Users
22 Reactions
870 Views
Posts: 7928
Free Member
Topic starter
 

I wanted to set up another email account with a gmail address. So I set it up and google transfered my google log in details from my existing hotmail account to the new one. I still can access my current hotmail account so all good

today I receive an email from ‘email management team’ (to my hotmail account) saying ‘we received your request to deactivate your account, if this was made incorrectly then click this link’. Now I don’t want to lose my existing account, and given only yesterday I created the new email I assumed legit and clicked on the link. It then presents with a page asking me to put in my log in details with the address us21.list-manage.com, which is Microsoft branded but looks dodgy af. So I check the email address the original mail is from and it’s from a doctorkanna@hotmail.com!

im 99% sure this is a con, but how on earth did they realise I’d just set up a new gmail account, which is the reason I thought it may be genuine?

or am I being overly paranoid here? My one concern is I don’t want my Hotmail account to be closed down on the slight off chance it is genuine

 
Posted : 20/12/2023 5:19 pm
Posts: 76786
Free Member
 

My one concern is

... exactly why these scams work.

If it was legit, you'd get a request for confirmation rather than a request to stop them.

how on earth did they realise I’d just set up a new gmail account

Coincidence? /shrug

I get them all the time talking about the imminent suspension of my Tinder profile, my Lloyds bank account or my Apple ID, often packaged as something like [color=red]URGENT ACTION REQUIRED!![/color] Which would all be slightly more convincing if I actually had accounts on any of those things.

 
Posted : 20/12/2023 5:30 pm
Posts: 45245
Free Member
 

It's not genuine.

They scatter gun a bazillion people, and one of them happens to be closing an email down.
Of course thinking your email is being closed is a strong motivator to react.

Mark as junkmail and move on.

 
Posted : 20/12/2023 5:31 pm
thols2, grizedaleforest, stevie750 and 7 people reacted
Posts: 7928
Free Member
Topic starter
 

Fair point.. how on earth did they know I’d just set up the other account however, coincidence ?

do I need to do some kind of virus sweep given I clicked the original link? I’m using an I phone 

ta

 
Posted : 20/12/2023 5:33 pm
Posts: 76786
Free Member
 

Probably not. Thought you've confirmed that your email is a valid address (and likely to click on links) so expect a sharp uptake in spam for a few weeks.

If on the other hand you've entered any credentials, you really need to change your password as a matter of some urgency. And at the risk of sounding like a scratched record, you really should have MFA on your email account if you haven't already.

 
Posted : 20/12/2023 5:37 pm
Posts: 7373
Free Member
 

Never rule out the possibility of an insider selling on your data.

My FiL has recently had dementia assessment and various medical interactions.

All of a sudden he's getting cold called and signed up to various insurances and payments that appear to be legit companies selling services and not outright scams, but it's all stuff he definitely doesn't want, need, or understand.

It *could* be a concidence, but he wasn't getting these calls last year, and we aren't getting them now.

OTOH targeted advertising and browser tracking etc can be pretty effective too. As is the straightforward scatter-gun when it happens to hit the target.

 
Posted : 20/12/2023 5:49 pm
Posts: 7928
Free Member
Topic starter
 

really should have MFA

What’s that?

 
Posted : 20/12/2023 5:53 pm
Posts: 7119
Full Member
 

Multiple factor authentication

 
Posted : 20/12/2023 5:57 pm
Posts: 7119
Full Member
 

So they text you to say " did you really want to send £9000 to the Nigerian prince ?"

 
Posted : 20/12/2023 5:59 pm
Posts: 7536
Full Member
 

What’s that?

Multi factor authentication. Normally a text message or an app on your phone which pops up a one time code/click yes to approve the login request if it isnt on preapproved computer.

 
Posted : 20/12/2023 5:59 pm
Posts: 29577
Full Member
 

Ignore. It's just a scattergun attack relying on a tiny percentage of recipients having reason to consider the request valid... be it timing, forgetfulness, fear... whatever.

 
Posted : 20/12/2023 6:00 pm
Posts: 7928
Free Member
Topic starter
 

Cool thanks

stipid hotmail won’t allow me to change my password for 30 days as the number I have on the account which it wants to send a code to is out of date. Despite me having the existing password! Luckily I didn’t enter the password in the scam email!

I’ve run a scan on phone using something called ‘avast’ and it’s found nothing untoward

 
Posted : 20/12/2023 6:36 pm
Posts: 12847
Free Member
 

I’ve run a scan on phone using something called ‘avast’ and it’s found nothing untoward
ironically it’s the avast app itself (and anything else that claims to offer ‘protection’ for an iPhone) which is the scam!

 
Posted : 20/12/2023 6:51 pm
Posts: 45245
Free Member
 

Get that phone number and password updated.

Get two factor authentication set up - I use the Microsoft app as we also have it for work, but Android also has one.

Also, get faster at choosing to mark things as spam. Both Gmail and Outlook you can do it with a right click or long press on a phone, or from top menu. Just be brutal on this. Any company looking to contact you can phone or write. Any account changes will NOT require you to click here and login there - and will be good at telling you this in their emails.

 
Posted : 20/12/2023 7:01 pm
Posts: 1547
Free Member
 

I get loads of these, seem to come in waves. I don't delete but click the report junk button and report as phishing. After a few months of doing this the numbers subside for a while.

 
Posted : 20/12/2023 7:16 pm
kelvin and kelvin reacted
Posts: 13060
Full Member
 

Get two factor authentication set up – I use the Microsoft app as we also have it for work, but Android also has one.

If you're using a password manager many of them have the ability to set-up MFA inside the vault. That way if you've left your phone home it's there in the vault ready to go and will autofill while the vault is open at the login you've just used. You are using a password manager for long and random passwords?

 
Posted : 21/12/2023 8:06 am
 mert
Posts: 3688
Free Member
 

Fair point.. how on earth did they know I’d just set up the other account however, coincidence ?

They didn't know. i got the same mail yesterday (or a very similar one). I haven't set up a new account in 3 or 4 years.
Probably means that a site we both use has "lost" some email addresses and they are just scattergunning a list they've bought.
And the lists they buy are huge. Hundreds of thousands of addresses, or more.

 
Posted : 21/12/2023 8:20 am
Posts: 3193
Free Member
 

Fair point.. how on earth did they know I’d just set up the other account however, coincidence ?

Yes. Coincidence. As @kelvin described. They send out lots of emails, many people receive one, many of those won't see it as their spam/junk filters are working well, some will see it and bin it, some like you will associate it with a recent event, and some will act on it.

Phone AV. Oh. Dear.

 
Posted : 21/12/2023 9:06 am
Posts: 76786
Free Member
 

And the lists they buy are huge. Hundreds of thousands of addresses, or more.

My largest password list is 11GB. Back of an envelope calculation, I estimate that (conservatively) at about a billion passwords.

 
Posted : 21/12/2023 12:04 pm
Posts: 76786
Free Member
 

really should have MFA

What’s that?

I've been blogging about passwords, hopefully in an accessible manner. This thread prompted me to write the latest post which is here and covers off a brief overview of MFA: https://blueteamhackers.com/old-mcdonald-had-a-password-m-f-m-f-a/

The series itself starts here: https://blueteamhackers.com/why-your-password-is-important/

 
Posted : 21/12/2023 2:38 pm
Posts: 4156
Free Member
 

I check the email address the original mail is from and it’s from a doctorkanna@hotmail.com!

I think you mean the sender had specified the 'from' address as doctorkanna@hotmail.com - it's very easy to send an email with any 'from'address you choose. If you look in the email headers you can see the IP address it was sent from and, in most cases, whether that server was authorised to send emails from hotmail.com

 
Posted : 21/12/2023 5:39 pm
Posts: 3193
Free Member
 

Looking at the full message headers and routing information as @greybeard implies is informative for regular spam and phishing. So much of it fails any authenticity quickly.

 
Posted : 21/12/2023 6:12 pm
Posts: 3193
Free Member
 

@cougar great blog! Where is part 5?

I still have fun with the Gibson research haystack https://www.grc.com/haystack.htm

 
Posted : 21/12/2023 6:25 pm
Posts: 76786
Free Member
 

it’s very easy to send an email with any ‘from’address you choose.

It is, but that in itself is evidence that it's dodgy.

@cougar great blog! Where is part 5?

Thank you. Give me a chance, I've only sat on #4 for like a year.

I still have fun with the Gibson research haystack

It's my professional opinion that Steve Gibson is a nob.

 
Posted : 21/12/2023 6:44 pm
Posts: 4156
Free Member
 

It’s very easy to send an email with any ‘from’ address you choose.

<br />It is, but that in itself is evidence that it’s dodgy.

To somebody who knows to read the headers and see that the 'from' address is inconsistent with them, it's a dead giveaway, but 98% of email users won't do that, and 95% still think that 'from' address shows who sent it. (You may know the real % but the point stands).

 
Posted : 21/12/2023 10:04 pm
Posts: 1547
Free Member
 

I deem myself savvy enough to double check if I'm suspicious but I never knew you could change the 'from address'.

Is this the case of those working under the hood of IT assuming their common knowledge is common to those of us driving out computers?

I'll read Cougar's blog though. Everyday's a school day

 
Posted : 21/12/2023 10:17 pm
Posts: 76786
Free Member
 

I deem myself savvy enough to double check if I’m suspicious but I never knew you could change the ‘from address’.

It's slightly more quirky than that, but the short version is that you cannot trust "from" as presented.

I’ll read Cougar’s blog though. Everyday’s a school day

For the avoidance of doubt: I'm co-author on that blog, I cannot take credit for most of it. My contribution has been the articles I've linked above, my mate Glenn is the primary owner. He's pitching at cybersecurity professionals, I'm pitching at regular people. I would deeply appreciate any feedback, if I've made someone go "... oh!" then I'd consider that mission accomplished.

 
Posted : 22/12/2023 1:33 am
Posts: 45245
Free Member
 

On a related note we have a new IT support/supplier at work who have implemented a new spam filter. It shows us twice daily any suspect emails. It has been enlightening how many emails these systems catch daily in a work setting - before the system quietly blocked what it did not like and you would not know.
My work email alone catches 2-5 phishing emails a day, on top of another 5-10 spammy/cold calling/I am not on a mailing list emails.
As a (small charitable) organisation of 40 people we have had three very targeted digital phishing/hacking efforts in the last three years. Criminals getting hold of our email footers, names and job roles in the organisation and fabricating emails 'from' the CEO and similar.

We all need better systems and better awareness of these things.

I do worry that our staff team, wonderful as they are, are a real weak point.

 
Posted : 22/12/2023 8:44 am
Posts: 76786
Free Member
 

We all need better systems and better awareness of these things.

I do worry that our staff team, wonderful as they are, are a real weak point.

This is another "this is a hill I will choose to die on" argument.

You are 100% correct that the weakest link in this chain is people, and staff training is critical.

However. Precisely because of that, we should be making every effort to ensure that they are never put in the position where they have to make a decision along the lines of "is this a scam / phishing / otherwise bogus?" If, in a corporate environment, a user is presented with an email laden with credential harvesting or cryptolocking malware then the system has already failed and we're into Thoughts And Prayers territory. Running fire evacuation drills doesn't mean we can get rid of all the fire extinguishers.

 
Posted : 22/12/2023 11:21 am
Posts: 76786
Free Member
 

Also,

If you "do worry" then do something about it. Back to the blog, Glenn and I differ here slightly in opinion but an awareness campaign is no bad thing because people use computers and devices at home too. My hot take is that there are many ways in which a suspicious email has 'tells' but it is a mistake to have a user interact with it. Rather my golden rule is get them to consider, "was I expecting this?"

Hostile emails are designed to fluster recipients, to make them panic and react rather than pause and think. We can wax lyrical all day about how to spot malformed domains or forged sender addresses, but the bottom line is that if you receive something which makes you go "huh?" then just STOP.

I've blogged about passwords and MFA, but I was once asked "what's the one thing we can do today to best improve our security posture?" and I replied "amputate everyone's right index finger." 😁

 
Posted : 22/12/2023 11:33 am
Posts: 76786
Free Member
 

Where is part 5?

Here you go.

https://blueteamhackers.com/password-smashword/

 
Posted : 22/12/2023 4:10 pm