Edf-fake-mails

From aldeid
Jump to navigation Jump to search

Description

Several types of emails have been sent to people in France from people pretending to be *EDF*, a leading energy player in France. They try to convince users to click on malicious links.

This article analyzes these emails and give you advice about how to detect they are fake and dangerous emails.

Email 1

How does the email look like?

The first email looks like this:

De : Bleu ciel <[email protected]>
Date : 6 septembre 2012 20:39
Objet : EDF: Votre prélèvement bancaire a été rejetée.
À : "firstname lastname" <[email protected]>

EDF-Bleu ciel

Cher(e) Client(e) : N° F07180.3092.8300.0671

Votre paîement à été refusée par votre établissement bancaiire en raison d'un problème technique sur le systeme de
prélêvement automatique,

Pour eviter la pénalités de retard ,nous vous donnons la possibilité de pâyer en ligne votre systeme de prêlevement,

Afin de régler votre prelevment automatique , www.particuliers-edf.com

Lors d'êchec de regularisation de votre situation , nous procéderons à la suspênsion de fourniture d'energie ,Cette
intervention vous sera facturée .

Cette mesure peut encore être évitée si le réglement de la fâcture est assuré sous 48 heures directement 
auprès de notre service

Merci de votre confiance .

Cordialement,

Votre conseiller EDF Bleu Ciel

First hints to notice (dramatically increases the likelihood of a malicious email):

  • number of spelling mistakes in the mail (e.g. "paîement" instead of "paiement", "a été refusée" instead of "a été refusé", ...)
  • Check that the reference (N° F07180.3092.8300.0671) does not correspond to your customer reference

First things to check:

  • the sender seems correct (Bleu ciel <[email protected]>). However, it is not a sufficient reason to trust the email
  • the domain (www.particuliers-edf.com) *seems* correct. However, we will analyze in the next section that it has nothing to do with an EDF related domain.

Analysis of the domain

Hosting information

The first thing to do in this case is to analyze the links. There is only one:

www.particuliers-edf.com

Let's use urlquery.net to analyze the domain:

We immediately notice that the website is hosted in the US, which seems suspicious for such a famous french company. This is confirmed by the whois information:

Information provided by the website

Now let's have a look at the website. It really looks like an EDF related website. However, the code analysis shows that everything is fake and that the website is only composed of a form. This one sends user inputs (personal data: email, password, name, postal address, phone number) to "Prelevement.php" hosted on the same domain.

All other content doesn't work (links are inactive, all content is made of pictures):

Analysis of the SSL certificate

One other hint is the fact that the entire site makes use of the HTTP protocol. Serious sites usually force the redirection to HTTPs (secured HTTP) to ensure the encryption of the communication when they deal with sensitive customers data, which is not the case here.

In addition:

Other email address used for the communication

That said, nobody would trust this website because we have gathered enough information to know what this website is about. However, we have completed the form to know more about this website and people maintaining it. Once the first form completed, credit card related information are requested:

Once the form is fully completed, following confirmation mail is sent:

ACTIVATION DE VOTRE COMPTE?‏
7:50 AM
  EDF BLEUCIEL
From:	EDF BLEUCIEL ([email protected]) 
Sent:	Sun 07/10/12 07:50
To:     [email protected]

Cher(e) lastname firstname

Encore une fois, nous vous souhaitons la bienvenue chez EDF, et vous remercions de votre confiance.

Attention :
Votre dossier n'est pas encore validé. Pour bénéficier rapidement de nos services, merci 
de nous transmettre 
les documents suivants :

[*] Une photocopie de votre pièce d'identité(recto et verso)
[*] Un justificatif de domicile de moins de 3 mois
[*] les deux face (recto et verso) de la carte bancaire avec ,
. laquelle vous avez procédé à l'inscription sur notre site

Par email : [email protected]

Vous avez des questions? Nos conseillers sont à votre écoute par email à l'adresse [email protected]

DUPAS PIERRE
Responsable Service client www.edf.com
Rejoignez-nous sur Facebook EDF.com

Cordialement,
Votre conseiller EDF Bleu Ciel
EDF SA au capital de 924 433 331 €, RCS Paris n° 552 081 317, siège social 22-30 av de Wagram 75382 Paris cedex 08.
Copyright © EDF 2010

This time, the email is requesting additional information:

  • A copy of the identity card
  • Proof of residence
  • A copy of the credit card

This information has to be sent to another email address using gmail.com (it has to be an email address the malicious team is able to access to):

[email protected].

Conclusions

The domain itself has nothing malicious (no exploit hosted on the website) and the attack is obviously a phishing attack which objective is to gather credit card information.

A lot of information are available to detect the attack. Please also refer to the final conclusions and best practices.

Also be informed that this attack is still working at the time of the analysis.

Email 2

How does the email look like?

De : Bleu ciel <[email protected]>
Date : 21 août 2012 00:10
Objet : Avis de coupure : non reception de papiers
À : "firstname.lastname" <[email protected]>

Cher(e) EDF Client(e) : N° F07000.3012.9400.1332

Votre paîement à été refusée par votre établissement bancaîre en raison d'un problème technique sur le systeme de
prélèvement automatique,

Pour eviter la pénalités de retard ,nous vous donnons la possibilité de régler en ligne votre systeme de prelevement,

Afin de régler votre prelevment automatique, cliquez ici

Lors d'echec de regularisation de votre situation , nous procéderons à la suspension de fourniture d'energie ,Cette
intervention vous sera fâcturée .

Merci de votre confiance .

As for the previous email:

But you should immediately notice that:

  • there are spelling mistakes
  • the reference (F07000.3012.9400.1332) does not correspond to your customer reference
  • the link points to 123triadreviews.us (put your mouse over the link without clicking it to reveal the domain)

Analysis of the domain

The analysis of the URL with UrlQuery.net shows that the domain is hosted in the US and doesn't look like an EDF related website:

This website is hosted on the same domain as particulars-edf.com (see first analysis):

Apart from this information, nothing leads to conclude that the website is malicious:

Hypothesis and conclusions

We can notice that the domain 123triadreviews.us has been hacked in the past (seen on zone-h.com):

As the domain does not look malicious and doesn't host any malicious content at the time of the analysis, one option is that the crackers team took over the website (they could have exploited a vulnerability) and uploaded malicious content. Once on the modified website, the malicious code is then executed by the browser. This attack is likely to exploit a vulnerability of unpatched browsers.

This attack is not working anymore.

Email 3

How does the mail look like?

De : BlueCiel <[email protected]>
Date : 7 août 2012 06:52
Objet : avis de coupure : non reception de papiiers
À : m <[email protected]>

Cher(e) Cliient(e),

Nous avons constatés un impayé sur votre dernière facture.

La société EDF vous avise que le service d'énergie sera suspendu à compter du : 7 août pour redevance non payée.

Cette mesure peut encore être évitée si le réglement de la facture est assuré sous 48 heures directement auprès de notre service

Afin de régulariser votre situation veuillez vous refferez ci-dessous :

<< Accedez à votre compte >>

Cordialement.

To be immediately noticed:

  • the mail contains spelling mistakes
  • the sender's email address is [email protected]
  • the sender's name is "BlueCiel" instead of "Bleu Ciel"
  • the link points to xtremenogales.com/edf

Analysis of the domain

UrlQuery.net indicates that the domain is hosted in Canada and that the attack (/edf/) seems not to work (301 moved permanently) anymore:

The website seems clean:

Also to notice: this domain (xtremenogales.com) has already been hacked in the past:

Hypothesis and conclusions

As for the previous case, it is likely that this website has been hacked by the crackers team who has modified it (uploaded malicious content in the /edf/ directory). As the content seems to have been withdrawn at the time of the analysis, no other information is available.

At the time of the analysis, it seems this the attack is not working anymore.

Conclusions and best practices

What such emails are about?

We have studied 3 cases that we can group into 2 types of attacks:

  • scamming site (site asking for sensitive data that will be used by the crackers team)
  • malicious websites (website that host malicious content trying to exploit vulnerabilities of unpatched browsers)

Such malicious mails often contain:

  • code that will try to exploit a vulnerability of the client:
    • mail clients (i.e. Thunderbird, Lotus Notes, ...)
    • browsers (i.e. Google Chrome, Safari, Mozilla Firefox, Microsoft Internet Explorer, ...)
  • links pointing to malicious domains:
    • asking for sensitive data
    • trying to exploit vulnerabilities of unpatched browsers

Best practices

Here are some best practices to avoid being trapped:

  • Don't trust email, even those sent by your bank. It does not mean that you send them to trash but... analyze them first
  • Analyze the sender's information: Name + email address
  • if the mail contains attachments, always scan them with virustotal before opening them. Gmail will automatically scan attachments before delivering them, and can open them in Google docs to avoid the eventual code from being executed on your machine.
  • Analyze the eventual links: put your mouse over the links to disclose the real domain!
  • If you have any doubt regarding a domain, right click on it and select "copy link" from the contextual menu. Then paste it to URLQuery. It is a very useful site that will browse the link for you and show you how the link looks like, as well as provide you with useful information (hosting location, eventual security alarms, ...)
  • Always have an updated browser:
    • Update your browser when patches are available (e.g. Microsoft Windows updates, Mac Appstore, Linux updates, ...)
    • Never trust third party updates. Some sites will popup a window claiming that your browser needs to be updated (e.g. Flash plugin, Java, ...). Don't trust them unless you absolutely know the reputation of the website.
    • Never accept updates when connected to public hotspots. Wait being in a safe location (at home or at the office).
  • If you have to provide sensitive data (e.g. credit card information), always check the certificate:
    • is it outdated? If yes, don't provide any data and contact the company
    • Is there a valid certificate? If the icon shows an invalid certificate or no certificate at all, never provide any sensitive data

Comments