My mom: I got the monthly bill from the mobile provider. But I can't open it.

Me: Why not?

Mom: It's in a ZIP file protected with a password.

Me *confidently*: Oh, this is a common trick. Scammers send malware like this to bypass e-mail gateway scanners.

Mom: Take a look.
So, I do. E-mail headers look perfectly OK. It really does seem to come from the mobile provider. Is this some trick I don't know?

The message addresses me correctly by name. OK, maybe they got it from somewhere.

Message says ZIP's encrypted with a password to protect data.
Password is my date of birth, YYMMDD. OK, that's not hard to find, either. But if this is an attack, it's a hell of a targeted one...

But you can see what's in the ZIP archive without entering a password; archive directory is not encrypted. It's a PDF file.

Hmm...
So, taking all precautions, I open the PDF file in the virtual machine with no Internet connection.

IT'S THE FUCKING MONTHLY BILL!!!

It's not an attack. The idiots have sent the bill exactly as the scammers do!

*That* is why we can't end phishing...
Wait, there is an update!

I sent an e-mail to their customer service, basically explaining them what idiots they are and why, and how to do this stuff properly.
They basically answered that "this is how we're doing it now", which is not surprising; customer service has no authority to make such decisions.

But look at the sender address.

ARE YOU FUCKING KIDDING ME?!
I mean, this thing - the "name" part of the address specifying one (seemingly valid) address and the actual e-mail address being completely unrelated shit is PRECISELY what we tell people to look for in phishing e-mails!!!
You can follow @VessOnSecurity.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: