I wrote already about spam impersonating various services just to make users click in order to visit a website. Most of the time, it is about online pharmacies.
This time, it is Google’s Support impersonated, as if it would contact the user to restore damaged messages. I leave aside the fact the this is technically questionable. Same as last time, the links point to a .PL file (Perl script) which contains just a redirect to a Russian website.
Last time it was bestpillgroup.ru, now it is curingpillsquality.ru. Not surprisingly, they point to the same IP address: 18.104.22.168 which seems to be inactive now. If you click on the links, you will see the WhoIs domain information. They are registered with the same admin-contact and are in different areas of the world.
We sent you a message. View messages We hope you found this message to be useful. However, if you’d rather not receive future e-mails of this sort, please opt-out here.
I can’t say anything right now about the end website because it is offline. But, I have a feeling that we will see such messages in the future.
What do we learn from here?
1. Always have a look at the sender and the recipient. This time it is somebody from some domain.
2. Don’t ignore the small things like typos or grammar errors. Most of the time, the fraudsters are not very good at writing in English.
3. Have a look where you click. The link behind the button should be inside the official domain (like google.com) and not to some strange server or IP address.
© Copyright 2014 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity
Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.
Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch