This week I got this run-of-the-mill DHL phishing in my ISC inbox. I have seen similar email from my personal email before. When I followed the URL for analysis, it automatically inserted my email address into the source email box and it included the SANS Technology Institute picture at the top of the page to make it look like I'm accessing the official website. What I also found interesting about this phishing email, both message below LOGIN which would normally be link with a URL, had nothing associated with them. Indicator https://showpiece.trillennium[.]biz/linknew/firebase1.php [1] https://www.virustotal.com/gui/url/8e307d79ecae2d57b2a306cac2a95f32f4afca21c5b7a61539af787c1a2f6a16?nocache=1 ----------- |
Guy 522 Posts ISC Handler Feb 13th 2022 |
Thread locked Subscribe |
Feb 13th 2022 3 months ago |
Hi Guy,
it seems to me this phishing was sent from your own domain (DHL@isc.sans.edu) that is protected against email spoofing by DMARC/SPF policies. If a homoglyph trick wasn't used, how they managed to pass it thru your inbound email gateway? Jan S, DHL InfoSec |
Anonymous |
Quote |
Feb 18th 2022 3 months ago |
Sign Up for Free or Log In to start participating in the conversation!