• Patch Lady – beware of email credential harvesting

    Home » Forums » Newsletter and Homepage topics » Patch Lady – beware of email credential harvesting

    Author
    Topic
    #195404

    A recent email came into the firm and it was sent from payment@paychex.com with a “wetransfer” file.  Enough red flags that of course I wanted to see
    [See the full post at: Patch Lady – beware of email credential harvesting]

    Susan Bradley Patch Lady/Prudent patcher

    7 users thanked author for this post.
    Viewing 10 reply threads
    Author
    Replies
    • #195406

      Two-factor authentication is fantastic. Not only does it make the login process much more secure, but it notifies you whenever anyone is trying to log into your account by sending you a text message.

      Group "L" (Linux Mint)
      with Windows 10 running in a remote session on my file server
      2 users thanked author for this post.
    • #195407

      Ooh I like that reverse.it service! I assume you didn’t _open_ the PDF (as that could itself activate malware if there is an unknown/unpatched Adobe vulnerabity), you just uploaded the attachment to reverse.it and let them open it in their sandbox? That’s so much easier than having to maintain an in-house VM for testing this kind of stuff…

      4 users thanked author for this post.
      • #195426

        On a VM that I didn’t care about I merely downloaded the pdf from the site to get it into a place so I could then upload it to reverse.it.  Merely putting the url didn’t get me the info I needed.

        Susan Bradley Patch Lady/Prudent patcher

        1 user thanked author for this post.
        • #195427

          As you can tell I STILL use a VM just to make sure, but yes you can merely download the PDF not open it.  Reverse.it site actually opens it up in their sandbox and takes pictures so you can see what it was and what it intended to do.

          Susan Bradley Patch Lady/Prudent patcher

          4 users thanked author for this post.
          • #195535

            Very cool site Susan. As always thanks so much for all you do.

            Red Ruffnsore

            1 user thanked author for this post.
    • #195413

      Why did the portable document format and reader need all of these exploitable capabilities?

      • #195424

        Because who doesn’t love extra features!?

        I honestly don’t know.  Did you know you can run a full 3D rendering in PDF?  You can create simplistic CAD models to display and show via the viewer.  Why you ask?  Why not.

        Disclaimer: Yes I know there are many reasons not to do this.

    • #195433

      ? says:

      Thank you for another excellent tip, Susan. I have multiple e-mails from different providers and they all have had data breeches over the years. I have turned off incoming except mail from known senders on all but one account and if anything fishy comes in there i just read the message header before deleting it. Any advice on how to stop the constant VoIP spoofing from “Lower Interest,” or “Free Caribbean Cruise?”

      • #195454

        Any advice on how to stop the constant VoIP spoofing from “Lower Interest,” or “Free Caribbean Cruise?”

        Yes!! Sign up for a service called “Nomorobo”. It’s VOIP-based, if I remember correctly and, best of all, it’s free for landlines and very low cost per month for cellular phone lines. Their website’s right here.

        My intent was simply to answer the poster’s question. Any further discussion about this will need to be started in a new thread.

        2 users thanked author for this post.
    • #195452

      Two factor authentication means having, in addition to a password, something like a second password or magic word or a street number of a house where one grew up but no longer lives in there, or a PIN and a token instead of a password, besides the user ID. But my email is from AOL. It used to be Verizon, but Verizon bought AOL and dumped the email part of the business on AOL, and so there I am.

      And AOL, as far as I can see, does not offer two factor authentication in its users’ accounts.

      I do access some government computers with RSA two-factor authentication, and it is very clear from the get go that two-factor login is available as well as required at those sites. AOL? Not so much, it seems.

      So thanks, Patch Lady, for this very worrying information, but…

       

      Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

      MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
      Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
      macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #195473

      Susan, did I read that right, that they were asking for e-mail credentials in order for you to access a WeTransfer file?

      I’ve used WeTransfer a number of times, and I’ve never been asked to provide credentials. You simply click on a link for the WeTransfer website that the sender, presumably someone you know, asked WeTransfer to email to you. (Maybe my experience with the service isn’t extensive enough?) A request for credentials to view the document, such as we see on that reverse.it page, is a bad sign.

      I would advise never to follow up on something like that without checking first with the supposed sender… and if I didn’t already know the sender, it would go straight into the recycling bin or junk mail folder.

      Caveat receptor!!

       

      2 users thanked author for this post.
      • #195497

        I periodically receive WeTransfer files from a known sender.  Same story here.  No two-factor authentication required.

        2 users thanked author for this post.
    • #195496

      So if for some reason your email provider doesn’t have two factor authentication, are you safe enough if you simply delete these emails without interacting with them? I know this sounds so obvious but I wonder these days if emails are advanced enough to attack me simply by being sent and unopened.. :s

      • #195522

        Some emails could trigger vulnerabilities in your browser if it is a webmail or your email program if it is local, although I don’t think those are common and you would often need to have the preview feature activated, which automatically displays the email content without having to open it.

        When the Yahoo breach happened, I think a lot of people got their account hacked and it was not due to them opening a tainted email. This risks to happen more as it is easier to exploit vs trying to exploit a vulnerability when browsers and email programs are automatically patched.

        I wouldn’t worry too much about that particular situation, although two-factor authentication is a great addition when considering the larger issue of email security and I would highly recommend it. Don’t forget that if you save a device as authorized to not be always bothered with two-factor authentication when logging in on this device and this device gets compromised by a trojan or something that would spy on you and could be remote controlled, the hacker could theoretically access the email from your compromised authorized device, although there is a risk you would see him do so.

        For best security at the expense of convenience, you should always have to enter the code sent to another device you have when accessing with one device. I like using Google Authenticator on the phone to access gmail on the desktop, but yes, you have to enter a code each time you want to check email on the desktop. The gmail account is not my main account. If you find that is too much hassle because you consult your email often, it is still better to have two factors authentication activated and save some “safer” device like an Iphone than the Windows desktop, but even if you save the Windows desktop as authorized, it is better than not having the two factors authentication activated, as it will still block access attempts from outside of those devices, which is a lot in the case of hackers stealing a password database, plus it warns you of access attempt. That’s great!

        2 users thanked author for this post.
        • #195539

          This is really getting confusing, or at least I am really confused:

          Besides, as I have understood, this being originally about the Patch Lady’s warning not to trust mails that ask for things one should keep to oneself…

          Is this conversation now also about using two-factor authentication to look at one’s email in, for example, one’s laptop (an email option I have only when accessing a government Webmail site, but  that I don’t have available for my private use at home and believe to be rarely available from a commercial ISP), is it about checking the email on a laptop from a cell phone or some other gadget (an unfamiliar procedure to me), is it both, or…?

          I’ll appreciate a helpful and practical answer in plain English, thanks.

           

          Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

          MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
          Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
          macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

          • #195547

            I can’t speak for anyone else but hopefully any corporate email account will have a number of protections in place. 2 factor authentication is great and it would be a good idea to use this for any personal email account….and not just email but any site you visit that deal with financial transactions, personal banking, credit cards, etc.

            Red Ruffnsore

            1 user thanked author for this post.
            • #195555

              One cannot use two-factor authentication for accessing one’s home email account when that option does not exist in said account, because ISPs usually do not provide it.

              Well, at least you might have made clear that this discussion does not concern home users.

              Now, if someone would also explain that strange thing about the cellphone (or other “devices”) and the PC…

              I am morbidly curious, that’s why.

              Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

              MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
              Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
              macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

              1 user thanked author for this post.
            • #195571

              Many millions of home users use the Microsoft or Google accounts mentioned in the article for email and do therefore have two-factor authentication available when logging in from a new computer. This would provide protection for anyone who fell for such a phishing email and revealed their password. The most common method is having a six-digit code sent to your phone as a text message when your email password is used from a new computer: Mobile-phone two-step authentication

              1 user thanked author for this post.
          • #195633

            Sorry for the confusion, Oscar.

            I was trying to respond in a manner as comprehensive as possible to anonymous asking if he was safe from this kind of emails even without two-factor authentication. I will try to be more clear for you and others, although I might clear up some confusion and add more at the same time, so feel free to ask more clarifications.

            If the email is simply asking you for personal information or redirects you to a fake web site that asks you this information after you click on a link in it, you might not be at risk looking at the web site or simply deleting the email, using two-factor authentication or not. However, there is no way to know for sure the email trick is only that dumb. It seems the example Patch Lady reported here was this kind of quite basic harvesting, harmless for those who would never put their credentials when asked like that even if there are fancy icons and it looks legit. This example doesn’t seem to automatically harvest anything from your computer that you would not have to submit yourself manually. So, likely, it is not very dangerous, to answers anonymous question, if you only look at the email or click on it without giving any information away. But my larger point is you never know that for sure. If I was a hacker, I could create a clever thing like this that looks basic, but rely on curiosity to silently infect you when you click on the link to see the form or whatever thinking you are so smart not giving your info. But for that to work, it might be as hard to pull off as it is to infect you when browsing, so don’t panic.

            I was merely pointing out an email link you click could redirect you to a website that would silently infect you even if you don’t submit any information, or the email message itself could do it by exploiting a vulnerability in your local email program when you preview or open the email locally if you didn’t patch your email program or if it is a not yet undisclosed vulnerability (which we call 0-days). Just like you shouldn’t go on shady web sites, you shouldn’t open shady emails, as the risk of this type of thing is higher.

            However, the probability of this fancy hacking happening is significantly lower than just being asked to provide banking account and some people complying, as this is so much easier to pull off even if you are not a hacker and it already works well in practice: just fake a bank home page and gather the data people willingly give you. Anyway, the kind of higher level infection you could get by exploitation of a vulnerability would compromise more than just your email account information, it could give access to your computer to a hacker, install anything, etc. The idea is if you want to lower your risk, don’t show emails in preview windows when it is unrequested emails from people you don’t know.

            But even then, how often does someone you know got infected and sent infected emails automatically to all the people in their address book? It happened a few times to me for sure to receive infected emails from people in my contacts list, so in theory not using the preview feature of your local email program even for people you know would be safer, but how are you going to know for sure the email is ok? It is not very practical with people you know because an email received might be a good email and you don’t want to call people saying did you sent me an email each time you get one before looking at it. You could lower the risk by setting your local email program to display emails as text only and activate the rest only when you think the email is legit. But is is still a pain. For me, I disable javascript, flash and all plugins from Thunderbird and I feel this is enough for home use, as I mitigate the risk of infection by using other tools like EMET to reduce the likelihood a vulnerability will be successfully exploited. Thunderbird is also likely not the most targeted email program for that kind of possible specific attack (the attack needs to target a specific vulnerability), plus it also offers some basic bad email detection.

            At work, I also have seen worse: hackers using compromised account to target us with specific emails looking legit from real potential consumers companies and containing code to exploit vulnerabilities, but it is probably less common for home users. And those fancy emails still asked to go to a web site or click on a link to try to infect the browser instead of the local mail program, so my local email program wasn’t targeted.

            I understand this might be too much for the home user.I would say don’t worry too much about those, as although the theoretical risk is there, it is so easy to do lazy harvesting that probably every email account that I have seen infected was by the company not protecting the data (like Yahoo) or probably people giving their credentials or logging into their webmail on any public computer. The point is all of these could have been protected by two-factor authentication, so let’s get back to two-factor authentication.

            What is two-factor authentication? For example, you have a Gmail webmail. You want that every time you try to access it, not only you need your password, but you will need a special one time code so anybody that would have your password but not that code could not access your email. You could set it in a way that Google sends you a text message with the code to your mobile phone each time you try to log in on any device. Then, you would have the added bonus of knowing if someone is trying to access your account because you would receive a text message when that happens while it would also prevent access.

            Another way this can work is to download the Google Authenticator app which works like those bank tokens and not just with Gmail but other services that would support it. The difference is when you log in, you need your password + the number shown at that moment (it constantly changes) in Google Authenticator instead of a code received by text message. The great thing is if you use a quite secure phone like an Iphone and you use your desktop to access email, the hacker that would have infected your desktop would also need the code on your phone. I think MrBrian pointed out that SMS was maybe not the most secure way to send codes so you could maybe have even less risk using the Authenticator instead of text messages, but we’re talking very fancy targeted hacking here, so probably out of the scope of this discussion.

            Of course, having to always enter a code from SMS or an app is annoying when you compulsively check your mail. So, you can have the option to register your device as validated so it doesn’t ask your code on this device again. This means a hacker could still not log in your email account from his remote computer, but if he had a command and control installed on your poor desktop, then he could by using your desktop, but he also would already be in your things, right? Since I don’t use my gmail account a lot, I don’t register any device. An alternative way would be to register only the Iphone and Ipad (maybe more secure devices) and not register the Windows devices. Then you compulsively check your mail on your phone all day, but look at it much less often on the computer. Two-factor authentication has this superb idea that if you split your authentication mechanism between two devices that are unrelated enough, the risk of a hacker having access to both at the same time is much lower. But even if you register all your devices to not be annoyed with codes all the time, it is still a much better security than nothing and will likely prevent your account from being stolen. I would strongly suggest to everyone to activate two-factor authentication, even if they want to register each of their devices to not sacrifice convenience.

            Now, is your normal ISP offering two-factor authentication on your pop account? Probably not. It might not even encrypt your connection and have your password sent in plain text, as well as all your emails. So, yes, treat emails like everyone in the world can see them and don’t use it to send passwords or any sensitive information, but it is especially bad with those ISP email accounts.

            Does that mean home users can’t use two-factor authentication? No. Webmails like Gmail et the one from Microsoft do offer it. Of course, you need to use those services. Maybe you could consider using your pop account for most things, but have a more secure webmail for some important things? Google is arguably better at security than many companies, so just by using their service, a bad email might get caught by them before everyone else. Imagine if you are Google and you notice millions of your users get the same email. I would trigger an alarm and probably remove it quickly if I were them… But you might not be comfortable with the whole idea of webmail and having your stuff online. I know the feeling, but it seems we can’t have our cake and eat it.

             

            2 users thanked author for this post.
            • #195660

              AlexEiffel,

              Thanks for taking the trouble to explain for the benefit, not just mine , but also of others who, by now in this discussion, might not be sure of what this all means in terms of their own safe use of email and etc.

              Although I am not sure am ready to agree with your suggestion of using Google Mail, after reading this:

              https://gizmodo.com/google-removes-nearly-all-mentions-of-dont-be-evil-from-1826153393

              So it looks like, from this time on, no more beating about the bush, they are just going to be evil.

              As to MS? Well…

              It all started when it was found that Google was working for the DoD on creating Proto- SKYNET, the employees learn about that, there was a tremendous flap…

              https://gizmodo.com/google-plans-not-to-renew-its-contract-for-project-mave-1826488620

              But I might be starting to go off topic here, so better sign off now.

               

               

              Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

              MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
              Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
              macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

              1 user thanked author for this post.
            • #196064

              I understand your worries. For me though, I don’t feel Google violated my trust. They didn’t use deceptive practices like Microsoft with their customers and they seem to respect the choice that they give me. The link you provided is certainly interesting, but I looks a bit like a grey area to me from the little I could make out of it. Is the removal of the don’t be evil that much linked to that or just something happening to an organization that doesn’t feel this kind of mantra might sound a bit to radical and a bit juvenile? I don’t say I agree, but it is maybe what explains that. I kind of liked this “we’re a big serious company that does stuff profesionnally, but we’re going to say something almost naïve but a certainly idealistic that is in plain simple terms”. In any case, I don’t think Google removes the don’t be evil to allow themselves to be evil. They could pretend they are not at all and be evil, that would be much more evil!

              I would be interested to know why people are so worried of Google in another thread. Yes, they collect data and it is their business, but I never heard of them selling the data to amateur third-parties, although I don’t research that subject because I don’t really use their products anyway. I am under the impression that they mostly control the data and provide services based on this data, which is quite different. It seems to me they often showed a concern for the user privacy when they introduced controversial features. I remember in the early gmail days how they said they would have nobody read your emails, but scan them to show relevant ads in it. They were upfront about it.

    • #195511

      Thanks for the heads-up, Susan.

      Knowing and seeing what’s really happening in the world is a great step toward being more wary about it happening to oneself.

      -Noel

      2 users thanked author for this post.
    • #195565

      I share OscarCP’s confusion.  Apparently, this thread is of no concern to home users who have email via ISP’s.  I don’t even have secure login from my ISP simply because I retain my accounts with their original address from the 90’s (roadrunner) and now Spectrum owns TWC and I, like most, don’t want to change my email addresses.  (I’m still TWC legacy but eventually Charter will force me to a Spectrum account.  However, Roadrunner email accounts will be around forever I am told as changing them would be a massive and almost impossible task for Charter).

      My passwords are sent in plain text (of course, I have Thunderbird 52.8 ESR manage them so I never have to type them).  If I want to change to a tiny bit of security for authentication then I will lose my Roadrunner addresses.  My accounts are all POP and I have zero desire to change that. Plus, I really dislike webmail.  Consequently, I have never used email for things that would need security.  In fact, not one of my email accounts has my real name…not even my first name as I was taught back in the 90’s to never reveal anything like your real name in email.  (Anon and Web1 was so superior to Web2 and all the insanity re social media).

      The state of email for most home users is abysmal so I use it as little as necessary and mostly for forum registrations, newsletters, that sort of thing.

       

      • #195707

        Mele20 wrote:

        Apparently, this thread is of no concern to home users who have email via ISP’s.

        Sorry, but disagree with your conclusion.

        Susan’s warning/advice–to beware of email credential harvesting–generally applies to pretty much anyone who uses email. While using an ISP-based or company-based email account might seem safer if considering only the particular scam email she chose to highlight, please realize that phishing attacks attempting to harvest account credentials and personal information are also run against both customers (accounts) at ISPs and employees (accounts) at individual companies.

        Noel Carboni wrote:

        Thanks for the heads-up, Susan.

        Knowing and seeing what’s really happening in the world is a great step toward being more wary about it happening to oneself.

        +1

        • #195737

          Anonymous #195707 :

          Some people have email service that allows two-factor authentication, but many don’t: that was my point and Mele20’s. To them (me included) much of the commentary posted here seems irrelevant.

          It is like warning the homeless that one should be careful not to keep the windows shut all the time, because otherwise naturally present radioactive radon might accumulate inside the house to unhealthy levels. So, homeless people, do get some fresh air now and then, would you?

           

          Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

          MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
          Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
          macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #195596

      I have two-factor authentication for my personal accounts, but at work we use Outlook desktop, so a stupidity can be quickly made.
      That’s why I made a rule for attachments and links in emails from unknown/unrelated senders in Outlook: ditch ’em, or open them on your mobile first to check what it’s really doing.
      Don’t know if that would stop the harvesting swindle, but it sure will prevent any Windows crippling.

      LMDE is my daily driver now. Old friend Win10 keeps spinning in the background
      1 user thanked author for this post.
    • #195620

      Mele20, Agreed, totally.

      My rule is: if I get a message and can see in the preview panel that it is asking for my own information, whatever or whoever is the alleged sender, I first ask myself the question: is this something I should be keeping to myself?

      If the answer is “yes”, I terminate with strong prejudice the, if at all possible, still unopened questionable message (being well aware that even having a peek at it in the preview panel is a risky thing to do, just not as much as opening to read it so,  ASAP, I scan my PC for malware.)

      Because, particularly at home, where my home email service does not have two-factor authentication, there is nothing else I can really do. And because, whether one has or not two-factor available (as I have in a government account) it is a good thing to do, anywhere and anytime.

       

      Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

      MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
      Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
      macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    Viewing 10 reply threads
    Reply To: Patch Lady – beware of email credential harvesting

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: