Fraudsters Mark Start of Fall Season with COVID-19 Themed DHL Scam
![ransomware on computer](/sites/default/files/styles/resource_image/public/2021-03/Ryuk-Ransomware.jpg?itok=3VV-aa9_)
Digital fraudsters marked the beginning of the fall season by sending out a coronavirus 2019 (COVID-19) themed DHL shipping ruse.
A COVID-19 Themed DHL Scam
Near the end of August, the 秋葵视频色 | AppRiver team came across a scam email that used global logistics company DHL as a lure.
The email claimed that a package had arrived for the recipient at a local DHL office. The mail dispatcher had attempted to find the recipient鈥檚 address, the email explained, but they were unsuccessful as the result of COVID-19 restrictions. In response, the dispatcher brought the package back to the local DHL branch.
![DHL email screenshot](/sites/default/files/2021-03/DHL-1.jpg)
Those responsible for this campaign attempted to add legitimacy to their attack email by spoofing its sender address. The message claimed to have originated from 鈥渘oreply@dhl[dot]com.鈥 But a closer look revealed that the email had actually come from the suspicious lookalike address 鈥渄hl-NORELY@dhil[dot]com.鈥澛燗t the time of writing, a Google search found that 鈥渄hil[dot]com鈥 was available for purchase.
The email didn鈥檛 stop there in its efforts to appear official, either. Near the end of its body content, it included DHL鈥檚 actual slogan 鈥淓xcellence. Simply Delivered.鈥 It also informed the recipient that they could call the DHL Customer Service team with any questions at 鈥00202 16345.鈥 A search online revealed that phone number belonged to a DHL hotline in Egypt.
Ultimately, the message sought to use these tricks to convince the recipient into opening an attached shipment return receipt and to bring it with them to the DHL branch indicated in the receipt. The attachment contained no such paperwork from DHL, however. Instead, it contained malicious macros that prompted the installation of an AZORult payload.
A Look Back at Other AZORult Campaigns and DHL Scams
This wasn鈥檛 the first time that the 秋葵视频色 | AppRiver team spotted AZORult in the wild. At the start of 2020, for instance, AppRiver Senior Cybersecurity Analyst David Pickett聽聽that began with a simple attack email. That email arrived with a PowerPoint attachment containing a heavily obfuscated visual basic script. In turn, the script led to a PowerShell command that included a reference to Drake's "Keke Do You Love Me" lyrics.
In addition to previously stopping a number of AZORult campaigns, this also isn鈥檛 the only time that DHL-themed scam emails have been blocked by the 秋葵视频色 | AppRiver email threat platform. As an example, security researchers observed the聽聽impersonating DHL, UPS and FedEx in an attempt to deliver malicious .XLS files to users. The campaign used an OLE object within the document to distribute the trojan. Just a few months after that, security researchers at 秋葵视频色 | AppRiver came across a DHL-themed attack campaign similar to the AZORult operation discussed above. The email arrived with a .ZIP archive that when clicked聽dropped a payload for the AgentTesla remote access trojan.
Shoring Up Your Organization鈥檚 Defenses in Time for the Holidays
Unfortunately, malware campaigns and email attacks impersonating shipping companies will almost certainly grow more numerous (and more creative) as we approach the holidays. That鈥檚 why it鈥檚 important for organizations to strengthen their email security posture now. They can do this by investing in a solution that鈥檚 capable of analyzing incoming messages for IP addresses, malware signatures and other indicators of known threat behavior. This analysis should occur in real time so that legitimate pieces of correspondence can reach their intended destination.