{"id":25481,"date":"2024-11-20T06:10:28","date_gmt":"2024-11-20T14:10:28","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/11\/20\/news-19211\/"},"modified":"2024-11-20T06:10:28","modified_gmt":"2024-11-20T14:10:28","slug":"news-19211","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/11\/20\/news-19211\/","title":{"rendered":"\u201cSad announcement\u201d email leads to tech support scam"},"content":{"rendered":"\n<p>Tech support scammers are again stooping low with their email campaigns. This particular one hints that one of your contacts may have met an untimely end.<\/p>\n<p>It all starts with an email titled \u201cSad announcement\u201d followed by a full name of someone you know. The email may appear to come from the person themselves.<\/p>\n<p>A co-worker who received such an email pointed it out to our team. Looking around, I found the first report about such an email in a <a href=\"https:\/\/x.com\/juliaioffe\/status\/1754545974058328199\">tweet<\/a> dating back to February 5, 2024.<\/p>\n<p>With some more information about what I was looking for, I managed to find several more.<\/p>\n<p>There is a great deal of variation between the emails, but we do have enough samples to show you a pattern which looks like this:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"864\" height=\"288\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/11\/pattern.jpg\" alt=\"example of the email that shows the pattern of the Sad announcement emails\" class=\"wp-image-122458\" \/><\/figure>\n<p>Subject: Sad announcement: &lt;First name&gt;&lt;Last name&gt;<\/p>\n<p>Sometimes the colon is replaced by the word \u201cfrom\u201d.<\/p>\n<p>Then a short sentence to pique the reader\u2019s curiosity, which often references photos. Here are some examples:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWhen you open them you will see why I actually wanted to share them with you today\u201d<\/p>\n<p>&#8220;Never thought I would want to share these images with you, anyways here they are&#8221;<\/p>\n<p>&#8220;I&#8217;m presuming you should remember these two ladies, in that photo&#8221;<\/p>\n<p>&#8220;When I was looking through some old folders I found these 3 pics&#8221;<\/p>\n<p>\u201cit wasn&#8217;t initially my plan, but I had to change my mind about it\u201d<\/p>\n<p>&#8220;Two pictures that I wanted to share with you. They&#8217;re likely to bring a flood of memories to you, as they did to me&#8230;&#8221;<\/p>\n<p>&#8220;Probably should have contacted you a little bit earlier. Anyways just wanted to keep you updated&#8221;<\/p>\n<\/blockquote>\n<p>This is then immediately followed by a link. These also follow a certain pattern:<\/p>\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><code>gjsqr.hytsiysx.com<\/code><\/p>\n<p><code>tmdlod.vdicedohf.com<\/code><\/p>\n<p><code>gtfhq.rmldxkff.com<\/code><\/p>\n<p><code>pdbh.ramahteen.com<\/code><\/p>\n<p><code>owwiu.dexfyerd.com<\/code><\/p>\n<p><code>roix.unrgagceso.com<\/code><\/p>\n<p><code>yrlbi.vohdsniuz.com<\/code><\/p>\n<p><code>uqjk.mbafwnds.com<\/code><\/p>\n<p><code>vjdbd.hhesdeh.com<\/code><\/p>\n<p><code>mbjzo.enexoo.com<\/code><\/p>\n<\/p><\/div>\n<p>These domains are all registered with NameCheap and are only active for a few days.<\/p>\n<p>To close the emails off, the scammers end with a quote in the format:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;You do not find the happy life. You make it.&#8221; &#8211; &nbsp;Camilla Eyring Kimball<\/p>\n<\/blockquote>\n<p>The sender addresses are spoofed to look like they were coming from family or friends of the target. The actual sender addresses are compromised accounts from all over the world.<\/p>\n<p>The campaign looks to have targeted mainly the US, but I also found some located in Ireland and the UK and some odd ones in India and Italy.<\/p>\n<p>So, the question is, what are they after? The short-lived domains really made it hard for me to figure that out. It took me quite a bit to find a domain that was still active, but then I knew soon enough what the end-goal of the spammers was.<\/p>\n<p>A short chain of redirects sent me to <a href=\"https:\/\/niceandsafetystore0990.blob.core.windows.net\/niceandsafetystore0990\/index.html\"><code>https:\/\/niceandsafetystore0990.blob.core.windows[.]net\/niceandsafetystore0990\/index.html<\/code><\/a> which is now blocked by Malwarebytes Browser Guard.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"833\" height=\"541\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/11\/Browser_Guard_block.jpg\" alt=\"Malwarebytes Browser Guard blocks trhe Tech Support scammers site\" class=\"wp-image-122462\" \/><\/figure>\n<p>The <code>blob.core.windows.net<\/code> subdomains are unique identifiers for Azure Blob Storage accounts. They follow this format:<\/p>\n<p><code>&lt;storageaccountname&gt;.blob.core.windows.net<\/code><\/p>\n<p>Where&nbsp;<code>&lt;storageaccountname&gt;<\/code>&nbsp;is the name of the specific Azure Storage account. Spammers like using them because the <code>windows.net<\/code> part of the domain makes them look trustworthy.<\/p>\n<p>The website itself probably looks familiar to a lot of readers: A fake online Windows Defender scan.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"786\" height=\"580\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/11\/TSS_1.jpg\" alt=\"A website showing a fake Quick Scan of your system showing Threats found\" class=\"wp-image-122464\" \/><\/figure>\n<p>The fake Windows Defender site shows that your system is infected with loads of threats.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"903\" height=\"663\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/11\/TSS_2.jpg\" alt=\"Fake THreat Scan results using Malwarebytes detection names\" class=\"wp-image-122478\" \/><\/figure>\n<p>Funny enough the site claims to be Windows Defender, but uses Malwarebytes\u2019 detection names. For example: Microsoft does not detect the Potentially Unwanted Program which  Malwarebytes detects as PUP.Optional.RelevantKnowledge.<\/p>\n<p>Anyway, the website quickly takes up the entire screen, so you have to click or hold (depending on your browser) the ESC button to get back the controls that allow you to close the website.<\/p>\n<p>Now that you have seen the patterns in the email, we hope that you will refrain from clicking the links. The redirect chain can be changed and may be different for your location and type of system. So, there may be more serious consequences than an annoying website.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-avoid-the-sad-announcement-scam\">How to avoid the &#8220;sad announcement&#8221; scam<\/h2>\n<ul>\n<li>Always compare the actual sender address with the email address this person would normally use to send you an email.<\/li>\n<li>Never click on link in an unsolicited email before checking with the sender.<\/li>\n<li>Don\u2019t call the phone numbers displayed on the website, because they will try to defraud you.<\/li>\n<li>If in doubt, contact your friend via another, trusted method<\/li>\n<\/ul>\n<p>If your browser or mobile device \u201clocks up\u201d, meaning you\u2019re no longer able to navigate away from a virus warning, you\u2019re likely looking at a tech support scam. If something claims to show the files and folders from inside of your browser, this is another signal that you\u2019re on a fake page. Close the browser if possible or restart your device if this doesn\u2019t work.<\/p>\n<p>Despite the occasional arrests and FTC fines for tech support scammers and their henchmen, there are still plenty of cybercriminals active in this field. Scams range from unsolicited calls offering help with your \u201cinfected\u201d computer to fully-fledged websites where you can purchase heavily over-priced versions of legitimate security software.<\/p>\n<p>Unfortunately for some people these warnings may have come too late. So what should you do if you have fallen victim to a tech support scam? Here are a few pointers:<\/p>\n<ul>\n<li>Have you already paid?\u00a0Contact your credit card company or bank and let them know what\u2019s happened. You may also need to\u00a0<a href=\"http:\/\/www.ftc.gov\/complaint\" target=\"_blank\" rel=\"noreferrer noopener\">file a complaint<\/a>\u00a0with the FTC or contact your local law enforcement agency, depending on\u00a0your region.<\/li>\n<li>If you&#8217;ve shared your password with a scammer, change it on every account that uses this password. Consider using a\u00a0<a href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\">password manager<\/a>\u00a0and enable\u00a0<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">2FA<\/a>\u00a0for important accounts.<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/for-home\" target=\"_blank\" rel=\"noreferrer noopener\">Scan your device<\/a>. If scammers have had access to your system, they may have planted a backdoor so they can revisit whenever they feel like it. Malwarebytes can remove backdoors and other software left behind by scammers.<\/li>\n<li>Keep an eye out for unexpected payments. Be on the lookout for suspicious charges\/payments on your credit cards and bank accounts so you can revert and stop them.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/11\/sad-announcement-email-leads-to-tech-support-scam\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> People are receiving disturbing emails that appear to imply something has happened to their friend or family member. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32,32157,10544,10438],"class_list":["post-25481","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-news","tag-sad-announcement","tag-tech-support-scam","tag-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25481"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25481\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25481"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}