{"id":17965,"date":"2021-02-03T01:24:34","date_gmt":"2021-02-02T21:24:34","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/17965\/"},"modified":"2021-02-03T01:25:00","modified_gmt":"2021-02-02T21:25:00","slug":"the-hunt-for-mailing-lists","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/17965\/","title":{"rendered":"The hunt for mailing lists"},"content":{"rendered":"<p>As dangerous as it is when consumers think they\u2019re too boring to be of interest to cybercriminals, it\u2019s worse to hear the same from SMB owners. When they neglect basic protection, that suits cybercriminals just fine \u2014 their targets aren\u2019t always what you might expect. One example comes from a message that fell into our mail trap recently: phishing aimed at hijacking an e-mail service provider (ESP) account \u2014 for mailing lists.<\/p>\n<h2>How mail service phishing works<\/h2>\n<p>The scam begins with a company employee receiving a message confirming payment for a subscription to an ESP. The link in the message is supposed to give the recipient access to proof of purchase. If the recipient is indeed a client of the ESP (and the phishing does target actual clients), they are likely to click through, hoping to figure out the anomalous payment.<\/p>\n<p>Although the hyperlink seems to lead to an ESP page, it really points somewhere else entirely. Clicking it takes victims to a fake site that looks very much like a legitimate login page.<\/p>\n<div id=\"attachment_38634\" style=\"width: 1628px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/02\/03012443\/the-hunt-for-mailing-lists-letter-en.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-38634\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/02\/03012443\/the-hunt-for-mailing-lists-letter-en.png\" alt=\"Two login screens. Fake page is on the left.\" width=\"1618\" height=\"855\" class=\"size-full wp-image-1796817966\"><\/a><p id=\"caption-attachment-38634\" class=\"wp-caption-text\">Two login screens. Fake page is on the left.<\/p><\/div>\n<p>At this point, readers won\u2019t be surprised to learn that any data entered on the fake login page goes straight to the cybercriminals behind the scam. Note, however, that in addition to the misdirection, the fake site transmits the data it harvests over an unprotected channel. The attackers didn\u2019t even bother to replicate the CAPTCHA, although they did insert an example in the e-mail field. We should see a flag\u00a0 in the lower right corner as well. But most users are unlikely to spot those discrepancies.<\/p>\n<h2>Why losing access to an ESP account is dangerous<\/h2>\n<p>In the best-case scenario, having gained control over an ESP account, the attackers will use the list of client e-mail addresses to send spam. Industry-specific mailing lists fetch a higher price on the black market than simple collections of random e-mail addresses, however; knowing a company\u2019s line of work helps cybercriminals tailor their spam.<\/p>\n<p>Given the cybercriminals\u2019 phishing specialty, it is likely that everyone on the stolen lists will receive a phishing e-mail that appears to come from the company. At that point, whether the recipient subscribed to a newsletter or is actually a client, they are likely to open a message, read it, and even click on a link in it. The sender doesn\u2019t seem suspicious.<\/p>\n<h2>Masking methods<\/h2>\n<p>Studying the phishing e-mail in detail, we found it had been sent through a mailing service, but a different one (a competitor of the ESP from which it purported to come). For the logic behind that decision, see our post \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-via-esp\/37467\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Phishing through e-mail marketing services<\/a>.\u201d Interestingly, to prolong the life of the campaign, the cybercriminals even made a landing page for their \u201cmarketing firm.\u201d (The page title, \u201cSimple House Template,\u201d isn\u2019t particularly convincing, though.)<\/p>\n<div id=\"attachment_38633\" style=\"width: 1118px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/02\/03012455\/the-hunt-for-mailing-lists-landing-en.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38633\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/02\/03012455\/the-hunt-for-mailing-lists-landing-en.png\"><\/a><p id=\"caption-attachment-38633\" class=\"wp-caption-text\">A landing page for the fake \u201cmarketing firm\u201d.<\/p><\/div>\n<p>The foregoing suggests the attackers might have detailed knowledge of the mechanisms of various mailing services, and they might attack other ESPs\u2019 clients as well.<\/p>\n<h2>How to guard against phishing<\/h2>\n<p>To avoid getting hooked, follow the standard tips:<\/p>\n<ul>\n<li>Avoid clicking links in unexpected messages, in particular any asking you to log in to a service. Even if the message looks legitimate, just open a browser and manually type in the name of the site.<\/li>\n<li>Check site security. If your browser does not recognize a site as secure, then someone can intercept your username and password.<\/li>\n<li>Learn how to spot standard signs of phishing, and then teach your entire staff how to do the same. You don\u2019t need to create your own classes; <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">online training platforms<\/a> are available for that purpose.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">specialized solutions<\/a> to filter out spam and phishing from corporate mail.<\/li>\n<li>Install and update <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solutions<\/a> on all work devices, so that even if someone clicks a phishing link, the danger will be averted.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.<\/p>\n","protected":false},"author":2598,"featured_media":17970,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1815,2416,2095,1799,76],"class_list":{"0":"post-17965","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-e-mail","10":"tag-esp","11":"tag-mail","12":"tag-mailings","13":"tag-phishing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/17965\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/the-hunt-for-mailing-lists\/22474\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/24179\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/the-hunt-for-mailing-lists\/22257\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/20971\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/the-hunt-for-mailing-lists\/24640\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/the-hunt-for-mailing-lists\/23847\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/the-hunt-for-mailing-lists\/30050\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/the-hunt-for-mailing-lists\/9303\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/38632\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/the-hunt-for-mailing-lists\/16350\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/the-hunt-for-mailing-lists\/16966\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/the-hunt-for-mailing-lists\/14445\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/the-hunt-for-mailing-lists\/26174\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/the-hunt-for-mailing-lists\/29976\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/the-hunt-for-mailing-lists\/26659\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/the-hunt-for-mailing-lists\/23510\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-hunt-for-mailing-lists\/28854\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-hunt-for-mailing-lists\/28661\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/e-mail\/","name":"e-mail"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17965"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17965\/revisions"}],"predecessor-version":[{"id":17969,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17965\/revisions\/17969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17970"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}