Week 8: Text messages supposedly from the Federal Council and other new phishing methods

28.02.2023 - The number of reports received by the NCSC rose again in the eighth week of 2023. Phishing messages in both email and text message form are among the cyberphenomena most frequently reported to the NCSC. In most cases, they are simple standard phishing attempts. However, last week saw a few very sophisticated and original variants being reported. This included apparent voice messages, password-protected phishing PDFs and phishing websites disguised as special offers on belated motorway tax sticker purchases.

Personalised phishing domain in an apparent voice message

Cybercriminals are constantly thinking up new cover stories to conceal their criminal intentions. The recipient of one phishing email reported it this week, because he was worried he might end up on a blacklist. A detailed analysis by the NCSC revealed the following background: The phishers had manipulated the sender address in the email so that it appeared to come from the recipient himself. Many people do not know how easy it is to fake the sender address, so this phishing email naturally caused the reporting person to worry that he might be reported as a phisher and end up on a blacklist.

However, the faked sender was not the only personalisation in this case. The HTML document in the email, which was disguised as a voice message, contained a phishing link tailored to the recipient. In order to listen to the voice message, the recipient was told to click on the link and then enter his email credentials on the subsequently opened page. His email address had already been completed in the login field.

Top: the email appearing to come from the recipient himself. Bottom: the HTML document with the phishing script. The login email address is already embedded in the phishing link, so that the emails give the impression of being personalised.
Top: the email appearing to come from the recipient himself. Bottom: the HTML document with the phishing script. The login email address is already embedded in the phishing link, so that the emails give the impression of being personalised.

Phishing link in a password-protected PDF

Another new variant was an email purporting to come from the support team of the Coinbase cryptocurrency exchange platform and containing a password-protected PDF. The email itself contains the password needed to open the PDF. The PDF, in turn, contains a link to a phishing platform which steals the Coinbase login data.

Left: email with password. The attached PDF (right) with the phishing link behind the "Confirm now" button. The document can be opened by entering the password in the email.
Left: email with password. The attached PDF (right) with the phishing link behind the "Confirm now" button. The document can be opened by entering the password in the email.

Sending a password-protected document together with the password is about as secure as leaving the key in the door of a safe.
The encryption in this case is designed solely to circumvent an automatic analysis of the PDF by anti-virus software or other security programs. It is also a reliable indication of malware or phishing.

Apparent text message from the Federal Council leads to a disguised phishing page

It is nothing new for the Federal Council to address a message directly to the Swiss population. However, this has never yet taken the form of a text message. The NCSC has now received a report of a text message purporting to be from the Federal Council, in which a tax refund of CHF 160 is promised. Anybody following the phishing link ends up on a website with the Federal Administration logo, which asks people to enter their credit card details in order to receive the apparent tax refund. This website is wearing a cunning disguise: anyone clicking on the link usually ends up on the phishing website. However, if an automatic analysis is run – like the ones performed by the NCSC – the website tries to detect this and show a harmless Arabic news site instead of the phishing website. This mechanism is intended to prevent automatic analysis by security researchers.

Left: the phishing ("smishing") text message; right: the phishing site unmasked. A nice detail is that it also advertises the Federal Administration's Votelnfo app.
Left: the phishing ("smishing") text message; right: the phishing site unmasked. A nice detail is that it also advertises the Federal Administration's Votelnfo app.

Phishing webshop apparently from Swiss Post

An old friend among phishing techniques is apparently aimed at stragglers who have yet to buy a motorway tax sticker, and offers them a "fantastic" special offer on the stickers. A new aspect is the fact that the phishing link appears to lead to a Swiss Post webshop.

Left: phishing email with the special offer; right: the fake Swiss Post webshop. The website is so badly designed that not even the number of ordered stickers can be changed.
Left: phishing email with the special offer; right: the fake Swiss Post webshop. The website is so badly designed that not even the number of ordered stickers can be changed.

The website is so badly designed that none of the links work and the number of ordered stickers cannot be changed. However, one can imagine that the phished credit card details would end up with the phishers in any case.

Recommendations:

  • Wherever possible, use two-factor authentication. This offers an additional layer of protection to prevent your account from being hacked.
  • No bank or credit card company will ever send you an email requesting that you change your password or verify your credit card details.
  • Never divulge personal data such as passwords or credit card details on a website that you have accessed by clicking on a link in an email or text message.
  • Bear in mind that email sender IDs can easily be spoofed.
  • Be sceptical if you receive emails that require action from you and otherwise threaten with consequences (loss of money, criminal charges or legal proceedings, account or card blocking, missed opportunity, misfortune).

Last modification 28.02.2023

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/aktuell/im-fokus/2023/wochenrueckblick_8.html