August 16 - U.S. To Deny Taiwan New F-16 Fighters - AddThis
I got an email “from” my boss, looking like it was sent using one of those “Add This” helper buttons. It was supposedly a link to a Defense News article that had caused quite a stir overnight, with the headline “U.S. To Deny Taiwan New F-16 Fighters" - an issue, as you may imagine, that is something we have been working on.
But look! The actual link wasn’t to the article at all, it was yet another attempt to trick me into revealing my user name and password for my work email. It’s that same link as the last two attempts over the last week or so.
A couple of interesting things about this email. One, it was sent using Big5 character set (that’s the encoding used for traditional Chinese characters, like the ones used in Taiwan, not the GB set used in China). It was created using the Freeware HTML editor by Kurt Senfer, which I’ve seen a lot of for these types of emails. It was sent from another Hinet IP address of 220.127.116.11 (very close to the ones used in the last two similar emails). Once again, the name of the computer is appropriate, using the name of the supposed sender (although misspelled, which I thought was funny).
Interestingly, the link to unsubscribe from AddThis looked legitimate, and I figured that it would tell me where the original version of this email came from, so I followed it to “unsubscribe”. Looks like the email address originally included in the unsubscribe code was “email@example.com.” Not something that I had seen before, and a search online doesn’t seem to find any hits for that email. Is it a legitimate email of someone they “own”? Is it an email they use for actual tasks like where to send replies or to gather emails that look good for later use? Who knows. Curious!
Subject: [Name, email address] has shared something with you
Received from: 18.104.22.168]
It struck me that I should look at what an actual “Add This” email would look like from Defense News. It looks pretty much exactly the same, which leads me to think that they must have sent themselves a copy, then modified it. So much work put into this, it’s crazy.
August 10 - Details of First Chinese Aircraft Carrier Revealed
I guess the first try at getting us to give up our email logins today failed, so they are trying again. And this is a really juicy email, about the first Chinese Aircraft Carrier formerly called the Varyag (purchased from Russia). It even has pictures! The pictures come from a real BBC news story on August 10 with the title “China’s first aircraft carrier ‘starts sea trials.’”
The email comes from the same supposed sender, using the same computer name and a slightly different IP address like the one from earlier today. Clicking on either the link or the pictures leads you to that same fake page where we are supposed to unthinkingly try to log in to our work emails. I have to hand it to them, though, the fake login page is very well crafted. (My thanks to a less-paranoid friend who went there and took a screenshot.)
Subject: Fw: BBC News: Details of First Chinese Aircraft Carrier Revealed
Received from: 22.214.171.124
NOTE: Just like the computer called “councilpc” is being used to send out emails “from” my NGO, so the computer used in this instance (and in the one earlier today) is named “firstinitial lastname pc” of the person supposedly sending out these emails. Seems like it’s the same group of people doing both of these, according to that pattern.
August 10 - Biden not to discuss with China arms sales to Taiwan
This was likely intended to bait us into revealing email login information, rather than being the “normal” attack emails with an attachment or link to a malicious file that would install malware on our computers. This is more along the line of traditional phishing attacks to try to trick you into giving up your login info. But it was obviously targeted at myself and my colleagues - we all got a copy of this email, and the URL itself in the email seems to indicate that it was targeted just at the three of us.
The supposed “sender” is a scholar at that same think tank that was targeted in the August 8 email linked to our defense conference (he has also spoken at the event before). The subject of the email and the text of the link references one of the major news stories on Taiwan defense issues early this week, and is the wording from a statement by the Taiwan Minister of Foreign Affairs on August 8.
I am too paranoid to actually go to the URL referenced in this email. (I really should get some sort of VM set up so I can look at things without being worried about being infected. I will at some point.) But I’m pretty sure it will look very similar to our email login page. Also interesting is that this bears some resemblance to a June 2009 email that I called “scarephishing” for our login info. The URL used in both are fairly similar, both ending with “servicelogin.htm.”
Subject: Biden not to discuss with China arms sales to Taiwan
Received from: 126.96.36.199
April 14 - Fake Contacts Update
Fake email sent to my colleague, attempting to get him to open the attached malicious Excel file. The coverage for this one is very sparse - only 7.1% at Virustotal. The “from” name is probably supposed to be prominent government affairs/strategy person from one of the largest trade associations in D.C. However, it’s not someone we normally interact with. The name in the gmail email address is unknown to me.
The email I called “all over the place" in the post from yesterday also contained an attachment called contacts update.xls. But it did not use capital letters, it was a slightly different file name, and the file hash was different.
April 13 - All over the place
This email, sent both to me and my two colleagues, is completely all over the place. It is so messed up that it seems amateurish in light of the other stuff we see. However, the Excel attachment does not have very good coverage at Virustotal.
I say that it’s all over the place, because the “From” name is the President of a prominent NGO. The (likely fake) “From” email address is the well known analyst at a prominent semiconductor sector market research firm. The username in the email “To” field is an actual Board member of that NGO, but the actual person works for another company, not the defense contractor whose domain is used. There is a person by the same name who is a senior analyst at that defense contractor, though, and I blanked out the email because I believe that the email address is his correct contact info.
So the whole thing is a huge jumble of names and organizations - doesn’t make sense at all. That, plus the fact that the attachment doesn’t match the content of the email, raised huge red flags. Both my colleagues knew to delete it right away.