Spam and phishing mail

Phishing attack to target the clients of a Japanese bank

Most phishing emails that aim to steal bank and e-payment data are written in English. However, we are seeing more and more fraudulent messages written in other languages, suggesting that the number of attacks targeting users in non-English speaking countries is growing. Here is an example of a fake notification in Japanese, supposedly sent on behalf of a major bank of Japan.

Japanese_phishing_1

The text of the fake message warned users of a possible leak of their personal data. They were also told that the bank system security had been updated to protect their accounts so they had to follow the link and enter their login details and passwords on the bank’s site to ensure their accounts weren’t blocked. The information entered in the phishing form was sent to the fraudsters who got access to the personal account of the victims and could control their money via the online banking system.

The ‘From’ field of the email specified an address registered on a well-known free mail service from a Taiwanese (.tw) domain. The address of the phishing page in the body of the message was similar to the official web address of the bank but the real address of the page to which the user was redirected was different. Since the fraudulent page was designed to look like the bank’s official page, users could only spot the trick if they paid close attention to the suspicious address in the browser.

A month later our colleagues registered a similar phishing mass mailing.

Japanese_phishing_2

The sender’s address looked genuine. The text informed recipients that the bank had updated its security system and users should follow the link to confirm their account details. That link went to the same phishing link as in the first example but this time the forgery was much more like a genuine link. Only a careful user would spot the difference.

Phishing attack to target the clients of a Japanese bank

Your email address will not be published. Required fields are marked *

 

  1. Hisako

    “こんにちは!” is strange for information to customers…

Reports

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox