Security

Cyber-crime

The only thing worse than being fired is scammers fooling you into thinking you're fired

Scumbags play on victims' worst fears in phishing campaign referencing UK Employment Tribunal


A current phishing campaign scares recipients into believing they've been sacked, when in reality they've been hacked – and infected with infostealers and other malware that means a payday for the crooks behind the scam.

The attack begins with an email that appears to be a legal notice informing recipients their employment has been terminated

While it's not unusual for scammers to play on people's fears – natural disasters, the COVID-19 pandemic (back in 2020), elections or other hot-button topics frequently appear as phishing lures – baiting people into clicking a malicious link because they think they've been canned "is brutal," said Blake Darché, head of Cloudforce One and threat intelligence at Cloudflare.

"This is this time of year when the economy slows down, and threat actors are preying on that," he told The Register.

Darché told us his team has seen 14 of its customers targeted by this emerging phishing campaign across sectors including aerospace, insurance, state government, consumer electronics, travel, and education.

The phishes have come from four different email addresses. Cloudflare hasn't attributed the attack but assumes the four handles are controlled by a single actor.

"Based on what we've seen, it does appear to be a financially motivated actor," Darché observed. "They are trying to get information off hosts, log into accounts, information stealing."

In one of these scams intercepted by Cloudflare, the email uses the subject line "Action Required: Tribunal Proceedings Against You", and includes the UK coat of arms plus a case number for the nation’s Employment Tribunal.

"This document is extremely urgent and requires your immediate action," the email warns. "Failure to comply with the instructions may result in serious legal consequences."

Recipients are also encouraged to press a “Download Document Now" button to access relevant information.

The link, of course, does not lead to any official Tribunal documents. Instead, it opens a fake Microsoft website laced with malware.

The scam only works on Windows machines. If the recipient tries to click the link on a Mac or iPhone, they see a banner across the top that reads: "This file cannot be opened on this device. Access it on a Windows device to view the document."

In addition to using Microsoft's logo and brand to appear legitimate, this Redmond-centric attack helps the attacker bypass security controls because the victim must retrieve the malware-laden file through more indirect means – it's not sent directly via email.

The phony court document is a RAR archive that contains a malicious Visual Basic script named "Processo Trabalhista.vbs" or "Labor Lawsuit.vbs." When executed, it downloads a Base64 encoded text file (file4.txt), saves it on the now-infected system, and then executes additional malware.

In at least one instance detected by Cloudflare, this included Ponteiro malware [PDF] – a banking trojan that steals credentials from financial websites.

"Threat actors are eager to try to drive engagement, and they're always iterating on how to do that," Darché explained, adding that just because they are using email for this social engineering scam right now doesn't mean they won't pivot at some point in the future.

"They might use another service, like LinkedIn or Facebook, to drive their objectives," he said. That objective is making money. "And they are always eager to take advantage of people." ®

Send us news
50 Comments

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed

Here's what $20 gets you these days

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

FireScam infostealer poses as Telegram Premium app to surveil Android devices

Once installed, it helps itself to your data like it's a free buffet