{"id":18763,"date":"2022-04-14T03:10:16","date_gmt":"2022-04-14T11:10:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/04\/14\/news-12496\/"},"modified":"2022-04-14T03:10:16","modified_gmt":"2022-04-14T11:10:16","slug":"news-12496","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/04\/14\/news-12496\/","title":{"rendered":"&#8220;Your AppI\u200ce\u200c \u200cl\u200cD\u200c \u200c\u200ch\u200c\u200ca\u200c\u200cs\u200c\u200c \u200c\u200cb\u200c\u200ce\u200c\u200ce\u200c\u200cn\u200c\u200c \u200c\u200cl\u200c\u200cocke\u200c\u200cd\u200c\u200c&#8221; spam email takes you on a website mystery tour"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Thu, 14 Apr 2022 10:53:25 +0000<\/strong><\/p>\n<p>Spam which claims your account has been locked out and needs to be fixed are common. They drive people to phishing campaigns on a daily basis.<\/p>\n<p>The mail below follows the same pattern with one key difference. It looks like a phish, but goes somewhere else entirely.<\/p>\n<h2>No, your Apple ID has not been locked<\/h2>\n<p>The mail claims to be from Apple, and is titled<\/p>\n<p><em>Re: [Ticket #265763] Your Appl\u200ce\u200c \u0406\u200cD has been locke\u200c\u200cd\u200c\u200c on [date]<\/em><\/p>\n<p>It reads as follows:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>Your AppI\u200ce\u200c \u200cl\u200cD\u200c \u200c\u200ch\u200c\u200ca\u200c\u200cs\u200c\u200c \u200c\u200cb\u200c\u200ce\u200c\u200ce\u200c\u200cn\u200c\u200c \u200c\u200cl\u200c\u200cocke\u200c\u200cd\u200c\u200c on [date] 2022 for \u200c\u200cs\u200c\u200cecurit\u200c\u200cy\u200c\u200c \u200c\u200cr\u200c\u200ceason\u200c\u200cs\u200c\u200c \u200c\u200cb\u200c\u200cecaus\u200c\u200ce\u200c\u200c you have \u200c\u200cr\u200c\u200ceache\u200c\u200cd\u200c\u200c the \u200c\u200cm\u200c\u200caximu\u200c\u200cm\u200c\u200c \u200c\u200cn\u200c\u200cumbe\u200c\u200cr\u200c\u200c of \u200cl\u200cn\u200cv\u200ca\u200cl\u200ci\u200cd\u200c \u200cs\u200ci\u200cg\u200cn\u200c-\u200ci\u200cn\u200c \u200ca\u200ct\u200ct\u200ce\u200cm\u200cp\u200ct\u200cs\u200c<\/em><\/p>\n<p><em>You cannot \u200ca\u200cc\u200cc\u200ce\u200cs\u200cs\u200c your \u200ca\u200cc\u200cc\u200co\u200cu\u200cn\u200ct\u200c and any AppI\u200ce\u200c services<\/em><\/p>\n<p><em>\u200c\u200cT\u200c\u200co \u200cu\u200cn\u200cl\u200co\u200cc\u200ck\u200c your account, \u200cy\u200co\u200cu\u200c&#8217;\u200cl\u200cl\u200c \u200cn\u200ce\u200ce\u200cd\u200c \u200cs\u200co\u200cm\u200ce\u200c \u200ca\u200cd\u200cd\u200ci\u200ct\u200ci\u200co\u200cn\u200ca\u200cl\u200c \u200cv\u200ce\u200cr\u200ci\u200cf\u200ci\u200cc\u200ca\u200ct\u200ci\u200co\u200cn\u200c<\/em><\/p>\n<p><em>For your \u200c\u200cs\u200c\u200cecurit\u200c\u200cy\u200c\u200c and to \u200c\u200ce\u200c\u200cnsur\u200c\u200ce\u200c\u200c only you have \u200ca\u200cc\u200cc\u200ce\u200cs\u200cs\u200c to your \u200ca\u200cc\u200cc\u200co\u200cu\u200cn\u200ct\u200c<\/em>.<em> We will ask you to \u200cv\u200ce\u200cr\u200ci\u200cf\u200cy\u200c your \u200ci\u200cd\u200ce\u200cn\u200ct\u200ci\u200ct\u200cy\u200c<\/em>.<\/p>\n<\/blockquote>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55700\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/attachment\/appleverify0\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0.jpg\" data-orig-size=\"632,669\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"appleverify0\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0-283x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0-567x600.jpg\" width=\"567\" height=\"600\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0-567x600.jpg\" alt=\"\" class=\"wp-image-55700\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0-567x600.jpg 567w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0-283x300.jpg 283w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify0.jpg 632w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><figcaption><em>Fake Apple mail<\/em><\/figcaption><\/figure>\n<\/div>\n<h2>From phish to website spam<\/h2>\n<p>Clicking the big grey \u201cverify account\u201d button should, in theory, lead you to an Apple phishing page. However, that\u2019s not the case here.<\/p>\n<p>The link directs people to completely random domains. Some of them appear to be advertisements. Others run the full range of everything from wall cladding services and polytechnics to hotels.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55709\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/attachment\/created-with-gimp-5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1.jpg\" data-orig-size=\"762,723\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Created with GIMP&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;Created with GIMP&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Created with GIMP\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Created with GIMP&lt;\/p&gt; \" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1-300x285.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1-600x569.jpg\" loading=\"lazy\" width=\"600\" height=\"569\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1-600x569.jpg\" alt=\"\" class=\"wp-image-55709\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1-600x569.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1-300x285.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM1-1.jpg 762w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<p>There appears to be no rhyme or reason to the URLs being served up. Clicking the link could pretty much drop you anywhere without warning.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55710\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/attachment\/created-with-gimp-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1.jpg\" data-orig-size=\"745,828\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Created with GIMP&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;Created with GIMP&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Created with GIMP\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Created with GIMP&lt;\/p&gt; \" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1-270x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1-540x600.jpg\" loading=\"lazy\" width=\"540\" height=\"600\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1-540x600.jpg\" alt=\"\" class=\"wp-image-55710\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1-540x600.jpg 540w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1-270x300.jpg 270w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/MAILSPAM2-1.jpg 745w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/figure>\n<\/div>\n<p>It currently leads to what appears to be a half-finished page about QR code generation.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55711\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/attachment\/created-with-gimp-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1.jpg\" data-orig-size=\"702,500\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Created with GIMP&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;Created with GIMP&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Created with GIMP\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Created with GIMP&lt;\/p&gt; \" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1-300x214.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1-600x427.jpg\" loading=\"lazy\" width=\"600\" height=\"427\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1-600x427.jpg\" alt=\"\" class=\"wp-image-55711\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1-600x427.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1-300x214.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify3-1.jpg 702w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>A QR code website<\/figcaption><\/figure>\n<\/div>\n<h2>Why is this happening?<\/h2>\n<p>At this point, we&#8217;ve established that there\u2019s no phish here. It&#8217;s using phishing as a panic-ruse to have you click through to multiple URLs via email campaigns. In this case, it appears someone has signed up to the below service, and is using this to spam.<\/p>\n<p>Navigating to the URL included in the mail with the campign component stripped out leads us to the below message:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55704\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/attachment\/appleverify2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2.jpg\" data-orig-size=\"890,489\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"appleverify2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2-300x165.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2-600x330.jpg\" loading=\"lazy\" width=\"600\" height=\"330\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2-600x330.jpg\" alt=\"\" class=\"wp-image-55704\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2-600x330.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2-300x165.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/appleverify2.jpg 890w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<blockquote class=\"wp-block-quote\">\n<\/blockquote>\n<h2>Mail blasting for fun and profit<\/h2>\n<p>Mail spammers will try and abuse legitimate services in order to drop as many missives in your mailbox as possible. Even with countermeasures in place, they&#8217;ll slip through the net of even the most careful service provider.<\/p>\n<p>Regardless of how the spam gets through, get through it will. If you provide mail marketing services, it\u2019s important to have a reporting feature in place. The ability to tie valid registrant details to campaign URLs is also crucial.<\/p>\n<p>If it\u2019s possible to highlight in mails sent out in some way that it\u2019s via your tool or app, so much the better.<\/p>\n<h2>Keeping yourself safe from mail spam<\/h2>\n<p>For recipients, much of the typical spam mail advice applies here:<\/p>\n<ul>\n<li>Always report spam, especially if it\u2019s going beyond the usual \u201cplease buy this t-shirt\u201d missive. If it&#8217;s a phish, a social engineering trick of some kind, or even something malware related, block and report. It\u2019ll help keep bad content away from others that little bit quicker.<\/li>\n<li>If you are redirected to a phish, you\u2019re perilously close to handing over logins to a scammer. Websites asking for details without the HTTPs are a massive red flag. However, as we often point out, scammers often make use of HTTPs certificates so this is no guarantee of safety from phishing. Rather, ask yourself if you typically receive emails from Facebook or Google or anyone else asking you to visit links and enter personal details. The answer should almost certainly be no.<\/li>\n<li>You can try the \u201cstrip out the campaign portion of the URL and see where you end up\u201d tactic. However, you won\u2019t know in advance if the URL on display is from a genuine marketer or just another rogue website. Search engines may assist here, but it\u2019s a bit of a shot in the dark and potentially risky.<\/li>\n<li>One final reminder: spammers reuse bogus mails all the time. While this one appears to redirect to random websites, the next identical message in your mailbox may well drive you to a phishing domain. Keep these fraudsters at arm\u2019s length with a metaphorical return to sender.<\/li>\n<\/ul>\n<p>We&#8217;ve reported the above mail campaign to the organisation above and hopefully it&#8217;ll be shut down soon.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/\">&#8220;Your AppI\u200ce\u200c \u200cl\u200cD\u200c \u200c\u200ch\u200c\u200ca\u200c\u200cs\u200c\u200c \u200c\u200cb\u200c\u200ce\u200c\u200ce\u200c\u200cn\u200c\u200c \u200c\u200cl\u200c\u200cocke\u200c\u200cd\u200c\u200c&#8221; spam email takes you on a website mystery tour<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Thu, 14 Apr 2022 10:53:25 +0000<\/strong><\/p>\n<p>We take a look at what appears to be a phish, but ends up directing you to endless random websites instead.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/04\/your-appie-ld-has-bee\/\">&#8220;Your AppI\u200ce\u200c \u200cl\u200cD\u200c \u200c\u200ch\u200c\u200ca\u200c\u200cs\u200c\u200c \u200c\u200cb\u200c\u200ce\u200c\u200ce\u200c\u200cn\u200c\u200c \u200c\u200cl\u200c\u200cocke\u200c\u200cd\u200c\u200c&#8221; spam email takes you on a website mystery tour<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,11157,25696,16430,16802,10574,10518,20891],"class_list":["post-18763","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-campaign","tag-id","tag-locked","tag-mail","tag-scams","tag-spam","tag-urls"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18763"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18763\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}