{"id":35125,"date":"2020-04-27T10:29:14","date_gmt":"2020-04-27T14:29:14","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=35125"},"modified":"2020-04-27T10:29:14","modified_gmt":"2020-04-27T14:29:14","slug":"covid-fake-delivery-service-spam-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/covid-fake-delivery-service-spam-phishing\/35125\/","title":{"rendered":"Fake deliveries in an age of lockdown"},"content":{"rendered":"<p>It would be hard to find a sphere of human activity untouched by the coronavirus pandemic, and express delivery services are no exception. Transport flows between countries have been disrupted, and there is a <a href=\"https:\/\/www.forbes.com\/sites\/tedreed\/2020\/04\/18\/demand-for-air-cargo-capacity-is-urgent-and-huge---who-will-step-in-to-fill-it\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">shortage<\/a> of cargo planes as people and companies continue to order goods both domestically and from abroad. Demand for some items has even <a href=\"https:\/\/www.nst.com.my\/business\/2020\/03\/579210\/covid-19-malaysias-top-glove-overwhelmed-international-orders\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">shot up<\/a>.<\/p>\n<p>The spikes in demand are causing in-transit times to stretch out. As a result, customers are getting used to receiving apologetic messages from couriers linking to updated shipping status. Recently, we have observed a number of fake sites and e-mails supposedly from delivery services exploiting the coronavirus topic. Fraudsters are using both <a href=\"https:\/\/securelist.com\/scammers-delivery-service-exclusively-dangerous\/66515\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tried-and-true ploys<\/a> and new schemes.<\/p>\n<h2>Spam with malicious attachments<\/h2>\n<p>Spammers may pose as delivery service employees to persuade victims to open malicious e-mail attachments. The classic trick is to say that to receive a package that\u2019s come in, the recipient must first read or confirm the information in an attached file.<\/p>\n<p>For example, a fake delivery notification e-mail in broken English says that a parcel cannot be delivered because of the pandemic, so the recipient needs to come to the warehouse and pick it up in person.<\/p>\n<p>The warehouse address and other details are, of course, said to be in the attachment \u2014 which, if opened, installs a Remcos backdoor on the computer. Cybercriminals can then make the PC join a botnet, or they might steal data or install other malware.<\/p>\n<div id=\"attachment_35130\" style=\"width: 1351px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101051\/covid-delivery-service-spam-screen-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35130\" class=\"size-full wp-image-35130\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101051\/covid-delivery-service-spam-screen-1.png\" alt=\"Fake delivery notification\" width=\"1341\" height=\"533\"><\/a><p id=\"caption-attachment-35130\" class=\"wp-caption-text\">Fake delivery notification<\/p><\/div>\n<p>The authors of another fake delivery e-mail use a similar trick, alleging that the company was unable to deliver the package because of a labeling error. The victim is asked to confirm the information in the attachment, which in fact contains another member of the Remcos family.<\/p>\n<div id=\"attachment_35131\" style=\"width: 1528px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101056\/covid-delivery-service-spam-screen-2.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35131\" class=\"size-full wp-image-35131\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101056\/covid-delivery-service-spam-screen-2.png\" alt=\"These crooks are pretending to be from a certain express delivery company, but the address gives them away\" width=\"1518\" height=\"444\"><\/a><p id=\"caption-attachment-35131\" class=\"wp-caption-text\">These crooks are pretending to be from a certain express delivery company, but the address gives them away<\/p><\/div>\n<p>Sometimes spammers insert images of documents in a message to add credibility. In the example below, scammers added a small image to the e-mail text. It appeared to be a receipt, but it was too small to read and did not change size when clicked, prompting the recipient to open the malicious attachment, whose name contains \u201c.jpg.\u201d<\/p>\n<p>If the recipient\u2019s e-mail client does not display the file\u2019s real extension, they might mistake such an attachment for the image. It\u2019s actually an executable ACE archive containing the spyware program Noon.<\/p>\n<p>To rush the victim, the cybercriminals say they need the missing information urgently so as to deliver the parcel before lockdown.<\/p>\n<div id=\"attachment_35132\" style=\"width: 1204px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101102\/covid-delivery-service-spam-screen-3.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35132\" class=\"size-full wp-image-35132\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101102\/covid-delivery-service-spam-screen-3.png\" alt=\"Fake delivery service e-mail containing an archive with a double extension\" width=\"1194\" height=\"658\"><\/a><p id=\"caption-attachment-35132\" class=\"wp-caption-text\">Fake delivery service e-mail containing an archive with a double extension<\/p><\/div>\n<p>Another malicious e-mail topic that\u2019s not new but is especially relevant in the current climate is delivery delays. The scenario is highly plausible: The scammers point the victim to an attachment that contains the Bsymem Trojan, which if executed enables the attackers to take control of the device and steal data. The bottom of the message includes a statement that it was scanned by a mail security solution and found to contain no malicious files or links, a claim designed to lull the recipient into a false sense of security.<\/p>\n<div id=\"attachment_35133\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101108\/covid-delivery-service-spam-screen-4.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35133\" class=\"size-full wp-image-35133\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101108\/covid-delivery-service-spam-screen-4.png\" alt=\"Fake notification about a delivery delay due to COVID-19\" width=\"1014\" height=\"689\"><\/a><p id=\"caption-attachment-35133\" class=\"wp-caption-text\">Fake notification about a delivery delay due to COVID-19<\/p><\/div>\n<p>Many spammers simply insert a mention of COVID-19 into their usual mailing templates, but some focus specifically on quarantines and the rapid spread of the pandemic.<\/p>\n<p>For example, in one story, the government had banned the import of any kind of goods into the country, so the package was returned to the sender.<\/p>\n<div id=\"attachment_35134\" style=\"width: 1474px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101114\/covid-delivery-service-spam-screen-5.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35134\" class=\"size-full wp-image-35134\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101114\/covid-delivery-service-spam-screen-5.png\" alt=\"Fraudsters claim that the government has banned the import of goods into the country\" width=\"1464\" height=\"719\"><\/a><p id=\"caption-attachment-35134\" class=\"wp-caption-text\">Fraudsters claim that the government has banned the import of goods into the country<\/p><\/div>\n<p>The attachment supposedly contains an order tracking number to request a reshipment after virus-related health restrictions subside. Opening the file, however, risks installing the Androm backdoor, which gives the attackers remote access to the computer.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h2>Phishing<\/h2>\n<p>Scammers specializing in phishing attacks are also taking advantage of delivery market chaos. We detected highly believable copies of legitimate websites as well as fake tracking pages. All of them, of course, made mention of the coronavirus.<\/p>\n<p>For example, phishers targeting accounts of a delivery service customers replicated the company\u2019s official homepage in detail, including the latest news about the pandemic.<\/p>\n<div id=\"attachment_35135\" style=\"width: 2010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101124\/covid-delivery-service-spam-screen-6-7.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35135\" class=\"size-full wp-image-35135\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101124\/covid-delivery-service-spam-screen-6-7.png\" alt=\"Official website (left) and phishing resource made to look like this website (right)\" width=\"2000\" height=\"966\"><\/a><p id=\"caption-attachment-35135\" class=\"wp-caption-text\">Official website (left) and phishing resource made to look like this website (right)<\/p><\/div>\n<p>No less detailed is this clone of another delivery service website, which also mentions the latest coronavirus news.<\/p>\n<div id=\"attachment_35138\" style=\"width: 2810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101831\/covid-delivery-service-spam-screen-8.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35138\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27101831\/covid-delivery-service-spam-screen-8.png\" alt=\"Phishing resource made to look like another delivery service website\" width=\"2800\" height=\"1200\" class=\"size-full wp-image-35138\"><\/a><p id=\"caption-attachment-35138\" class=\"wp-caption-text\">Phishing resource made to look like another delivery service website<\/p><\/div>\n<p>The authors of this fake portal for tracking packages added COVID-19 to the copyright line. There is little other information on the page: a form for entering credentials and a list of \u201cpartner\u201d e-mail services. Needless to say, entering credentials on this resource sends them to the scammers, and the fate of the package will remain unknown.<\/p>\n<div id=\"attachment_35140\" style=\"width: 1376px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27102318\/covid-delivery-service-spam-screen-9.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35140\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/27102318\/covid-delivery-service-spam-screen-9.png\" alt=\"Fake package tracking page\" width=\"1366\" height=\"768\" class=\"size-full wp-image-35140\"><\/a><p id=\"caption-attachment-35140\" class=\"wp-caption-text\">Fake package tracking page<\/p><\/div>\n<h2>How not to swallow the bait<\/h2>\n<p>Against the backdrop of the pandemic and the large number of genuine package delays, fake sites and e-mails have a good chance of success \u2014 especially if you really are expecting a package, or if, say, shipment details were sent to your work e-mail and you have reason to think that a colleague might have placed the order. To avoid getting hooked:<\/p>\n<ul>\n<li>Look carefully at the sender\u2019s address. If the message came from a free e-mail service or contains a meaningless set of characters in the mailbox name, it\u2019s most likely a fake. Keep in mind though, that <a href=\"https:\/\/www.kaspersky.com\/blog\/36c3-fake-emails\/32362\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">it\u2019s possible to forge sender address<\/a>.<\/li>\n<li>Pay attention to the text. A major company will never send e-mails with crookedly formatted text and bad grammar.<\/li>\n<li>Do not open attachments in e-mails from delivery services, especially if the sender insists on it. Instead, log in to your personal account on the courier\u2019s website, or manually enter the address of the service in your browser to check the tracking number. Do likewise if you received an e-mail urging you to click a link.<\/li>\n<li>Take special care if a message makes any mention of coronavirus. Cybercriminals exploit hot topics to attract attention, so you should never rush to comply with such messages.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a> that detects malicious attachments and blocks phishing websites.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>How scammers are exploiting delivery problems during the epidemic \u2014 and how not to fall for their tricks.<\/p>\n","protected":false},"author":2481,"featured_media":35126,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[3679,76,240,422,131,723],"class_list":{"0":"post-35125","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-coronavirus","9":"tag-phishing","10":"tag-spam","11":"tag-threats","12":"tag-tips","13":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/covid-fake-delivery-service-spam-phishing\/35125\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/covid-fake-delivery-service-spam-phishing\/20854\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/covid-fake-delivery-service-spam-phishing\/16530\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/covid-fake-delivery-service-spam-phishing\/8170\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/covid-fake-delivery-service-spam-phishing\/21611\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/covid-fake-delivery-service-spam-phishing\/19828\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/covid-fake-delivery-service-spam-phishing\/18581\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/covid-fake-delivery-service-spam-phishing\/22536\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/covid-fake-delivery-service-spam-phishing\/21490\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/covid-fake-delivery-service-spam-phishing\/28248\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/covid-fake-delivery-service-spam-phishing\/8156\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/covid-fake-delivery-service-spam-phishing\/14745\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/covid-fake-delivery-service-spam-phishing\/15106\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/covid-fake-delivery-service-spam-phishing\/13393\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/covid-fake-delivery-service-spam-phishing\/23839\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/covid-fake-delivery-service-spam-phishing\/28217\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/covid-fake-delivery-service-spam-phishing\/25350\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/covid-fake-delivery-service-spam-phishing\/22130\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/covid-fake-delivery-service-spam-phishing\/27430\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/covid-fake-delivery-service-spam-phishing\/27266\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/spam\/","name":"spam"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=35125"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35125\/revisions"}],"predecessor-version":[{"id":35128,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35125\/revisions\/35128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/35126"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=35125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=35125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}