For years, computer criminals have been targeting unsuspecting web users with post office email scams. This particular method of attack consists of a fake email in which a recognizable postal service notifies the recipient that it has failed to deliver a package to their address. The email subsequently asks that the recipient pick up the package themselves and provides a link by which they can arrange to do so. When the recipient clicks on the URL, however, they are redirected to a page that installs malware–in most cases, crypto-ransomware–onto their machines.
Heimdal Security notes that people tend to fall for this type of scam because by nature they trust familiar institutions such as the post office. The fact that attackers localize their fake emails, such as by customizing the name of each postal service and by correctly translating the email’s text according to a specific country’s language, only enhances the scams’ success rate. This explains why we saw at least two campaigns, one based in the United Kingdom and one based in Denmark, that leveraged post office email scams in an attempt to infect users with some variant of Cryptolocker ransomware earlier this year.
Unfortunately, computer criminals are always looking to exploit people, which means that no time of year is off-limits. In fact, it stands to reason that attackers prefer some seasons such as the holidays over others, for they know that during those periods users are less concerned about their own security and more concerned about convenience, shopping deals, and a package they might have received in the mail.
It is therefore unsurprising that a post office email scam has recently been observed targeting PostNord customers with Cryptolocker2 ransomware.
Heimdal Security explains in a blog post that the fake email employs one of three subject lines based upon whether the recipient lives in Denmark, Norway, or Sweden. It also comes with a dynamically generated folder, which enables the attackers to customize the contents of each message based upon the target’s country.
This folder’s contents in part appear as follows:
“Upon dissecting the payload, we saw that it’s delivered as a zip file that can be delivered only once,” Andra Zaharia of Heimdal observes. “As retaliation, cyber criminals have blocked several IP addresses that Heimdal uses in order to hinder our analysis. However, we managed to see that the payload that delivers the Cryptolocker2 infection is delivered only to IP addresses in Scandinavia.“
The attackers are making use of three domains in particular–“Romashka-plus [.] ru”, “gold comfort [.] ru”, and “solid parquet [.] ru”–as part of their spam campaign. These domains each launch an infection cycle that terminates with the file “info_ [5 random numbers] .zip“, whose binary is disguised as a PDF and which is loaded from “downloader.disk.yandex [.] com”. Upon completion, the file loads up Cryptolocker2, which encrypts all of the data stored on your computer and on the cloud apps synced to your PC. The ransomware also harvests victims’ email addresses and sends them to a C&C server for use in future spam campaigns.
Heimdal recommends that businesses protect themselves against this threat by blocking several word combinations that appear in the spam message and that would not otherwise appear in legitimate emails sent from Danish speakers.
Ordinary computer users can learn how they can protect themselves against ransomware by clicking here.
Title image courtesy of ShutterStock