02/01/2024
16:04

Phishing: the most common credential and/or data theft attempts in JANUARY 2024


Find out the most common phishing attempts you might encounter and avoid...

PHISHING INDEX

Below are the most common email phishing attempts detected by TG Soft's Anti-Malware Research Center in JANUARY 2024:

30/01/2024 => EuroPages
30/01/2024 => Mooney
27/01/2024 => BRT
25/01/2024 => Istituto Bancario (Bank)
24/01/2024 => Aruba - Fattura scaduta (Expired invoice)
18/01/2024 => Smishing UniCredit
17/01/2024 => Smishing Istituto di Credito (Bank)
13/01/2023 => Account Posta Elettronica (Email Account)
11/01/2024 => Account di Posta Elettronica
10/01/2024 => Trenitalia
09/01/2024 => Aruba - Fattura non pagata (Unpaid invoice)
09/01/2024 => Account Posta Elettronica (Email Account)
08/01/2024 => MetaMask
09/01/2024 => Mooney
07/01/2024 => Mooney
01/01/2024 => Aruba - fattura non pagata (Unpaid invoice)

These emails are intended to trick some unfortunate person into providing sensitive data - such as bank account information, credit card codes or personal login credentials - with all the possible easily imaginable consequences. 


January 30, 2024 ==> Phishing EuroPages

«SUBJECT: <Leonardo Rossi ti ha inviato un messaggio di richiesta riguardante il tuo prodotto> (Leonardo Rossi sent you a request message concerning your product)

We find again this month the following phishing attempt, that appears as a EuroPages communication, and aims to steal the login credentials of the victim's account.

Clicca per ingrandire l'immagine della falsa e-mail di EuroPages, che cerca di rubare le credenziali di accesso all'account.
The message, supposedly from EuroPages, the largest international B2B sourcing platform, notifies the user that a message about his/her product, listed on EuroPages, has arrived from a certain "Leonardo Rossi".  It then invites him/her to log into his/her account to view the request message, via the following link:

ACCEDI AL MIO ACCOUNT   (LOGIN TO MY ACCOUNT)

Analyzing the email, we notice that the message comes from an email address not traceable to the official EuroPages' domain <maisano(at)gruppocracco(dot)com>. This is definitely anomalous and should, at the very least, make us suspicious..


Anyone who unluckily clicks on the link ACCEDI AL MIO ACCOUNT (LOGIN TO MY ACCOUNT), will be redirected to an anomalous WEB page, which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use them for malicious purposes.


January 30, 202 ==> Phishing Mooney

SUBJECT: < Nuovo aggiornamento > (New Update)

Below we analyze the following phishing attempt that comes as a false communication from Mooney, the Italian Proximity Banking & Payments company.
Clicca per ingrandire l'immagine della falsa e-mail di Mooney, il sistema di pagamento online che cerca di rubare i dati sensibili del destinatario...

The message informs the recipient that he/she needs to update his/her information.
It then invites him/her to update his/her profile by following the security steps through the following link:

Aggiornamenti (Updates)

This time the phishing campaign simulates a communication allegedly  from the Italian online payment company Moone, which is clearly unrelated to the mass sending of these emails that are real scams whose goal remains, as always, to steal sensitive data of the unsuspecting recipient.

Analyzing the text of the message, we notice right away that the alert message comes from an e-mail address that could be misleading, but is not traceable to Moone's domain <noreply32425(at)mooney(dot)it>, although the cybercriminal had the foresight to include the company's logo. Let's always be very careful before clicking on suspicious links.


Anyone who unluckily clicks on the link Aggiornamenti (Updates) will be redirected to an anomalous WEB page, which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for malicious purposes.



January 27, 2024 ==> Phishing BRT

«SUBJECT < Il tuo pacco non può essere consegnato 63AUIT66001 > (Your package cannot be delivered 63AUIT66001)

Below is a new phishing attempt, hiding behind a false communication from BRT's service, concerning the delivery of a supposed package.

Clicca per ingrandire l'immagine della falsa e-mail di BRT che informa che la spedizione è in attesa di consegna...in realtà si tratta di una TRUFFA!
The message notifies the unsuspecting recipient that his/her shipment is pending due to unpaid additional customs fees. It then informs him/her that in order to receive the package, he/she must pay the customs fees of 2.28 euros. These messages are increasingly used to commit fraud against consumers who more and more use e-commerce for their purchases.
The following link is provided to complete the payment:

Conferma il pagamento  (Confirm the payment)

The alert email comes from an email address that is unrelated to BRT's domain <iubenda(at)magmalab(dot)eu>, this is definitely abnormal and should, at the very least, make us suspicious.

Anyone who unluckily clicks on the link will be redirected to an anomalous WEB page, which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for malicious purposes.


January 25, 2024 ==> Phishing Istituto Bancario (Bank)

SUBJECT:  <Importante > (Important)

We analyze below another phishing attempt, coming through an e-mail that, exploiting the well-known name of a national banking institution, try to pass themselves off as an official communication, to induce the unsuspecting recipient to insert his/her data. In this way the victim falls into a social engineering trap.


Clicca per ingrandire l'immagine della falsa e-mail di un noto Istituto Bancario, che cerca di rubare i dati dell'HomeBankingt...
The message informs the unsuspecting recipient that, because of a security adjustment procedure of its security systems - in compliance with the European Directive on online payment transactions - in order to continue operating on banking channels, his/her profile needs to be updated.

To proceed with the profile update, users are asked to confirm the personal information provided on the Banking Institution's website at the time of registration and to confirm their identity, via the following link:

Avvia la verifica >> (Start verification).

We can see from the outset that the alert message comes from an e-mail address <alfred(at)qhb(dot)t9iba(dot)info> that is very suspicious. Moreover the text, unlike official communications of this kind, is extremely poor and generic.

The purpose is to lead the victim to click on the link in order to continue using his/her account, exploiting the urgency of the communication.

Anyone who unluckily clicks on the link will be redirected to an anomalous WEB page, which is unrelated to the official website of the well-known banking institution, but which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for illegal purposes.

Considering the above, we urge you to pay close attention to any misleading details, reminding you that any Banking Institution, including the one in the present case, is clearly unrelated to the massive sending of these phishing campaigns. We also urge you, in case of doubt, to check the bank’s official website, which has repeatedly reported attempted scams exploiting its brand.



January 24, 2024 ==> Phishing Aruba - Fattura scaduta (Expired invoice)

SUBJECT:  <Aruba.it - Avviso di Fattura Scaduta 24/01/2024> (Aruba.it - Expired Invoice Notice 24/01/2024)

Phishing attempts, pretending to be communications from Aruba brand, continue.

Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare il rinnovo del dominio, ma in realtà è una TRUFFA!
The message informs the recipient that his/her domain hosted on Aruba, linked to his/her e-mail account, will expire on 24/01/2024. It then warns her/him that if the domain is not renewed, it will be deactivated along with all the services associated with it, including email accounts. He/she will therefore no longer be able to receive and send messages.
It then invites the user to log in to renew services, via the following link:

RINNOVA IL DOMINIO (RENEW THE DOMAIN)

Clearly, the well-known web hosting, e-mail and domain registration services company Aruba, is unrelated to the mass sending of these e-mails, which are real scams whose goal remains, as always, to steal sensitive data of the unsuspecting recipient.

Analyzing the text of the message we notice right away that the sender's e-mail address comes from a generic <Assistenza Clienti> (Customer Support), used as a label to hide the real sender, which is unrelated to Aruba's official domain. This is definitely anomalous and should, at the very least, make us suspicious. We can see, however, that the cyber criminal had the foresight to include the well-known Aruba logo to make the message more trustworthy.

Anyone who unluckily clicks on the link RINNOVA IL DOMINIO (RENEW THE DOMAIN), you will be redirected to an anomalous WEB page that is unrelated to Aruba's official website, but which has already been reported as a DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals who want to get hold of your most valuable data in order to use them for illegal purposes.


January 18, 2024 ==> Smishing UniCredit

We analyze below a new smishing attempt to obtain sensitive data through a fraudulent text message.

Clicca per ingrandire l'immagine del falso SMS che sembra giungere da Unicredit che cerca di rubare i codici dell'accesso all'home banking dell'ignaro ricevente.
The message, seemingly from Unicredit, alerts the unsuspecting recipient of a €221.45 payment request and invites him or her to verify the transaction via the link provided.
The criminals, through the false detection of a suspicious transaction, induce the user to promptly log into home banking for verification, thus stealing his/her credentials.
Clearly, for non-customers of Unicredit, the scam is simpler to understand. However, even customers of the bank, can easily understand that this is a real attempt at computer fraud.
In fact already at a glance, the malicious link on the text message seems anomalous and certainly not traceable to the official Unicredit's website.
We would also like to remind you that financial institutions don’t send an alert text message to report any abnormal access.
Anyone who unluckily clicks on the link, will be redirected to an anomalous WEB page, which is not related to the official Unicredit's website, but which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for criminal purposes.


January 17, 2024 ==> Smishing Istituto di Credito (Bank)

We analyze below two smishing attempts, carried out through messages that, exploiting the well-known name of a national banking institution, try to pass themselves off as an official communication, to induce the unsuspecting recipient to insert his data. In this way the victim falls into a social engineering trap.

ESEMPIO 1
ESEMPIO 2

In the messages above, the recipient is informed that an expenditure of Euro 1750.00 has been requested from his/her bank account.
It then invites him/her to make a report, in case he/she didn't request it, through the proposed link. We notice that the messages are similar, what changes is the landing site, which redirects to two different url addresses:
 
"https://grupo***[.]com" e "https://um****nt[.]com"

Surely, if the recipient of the text message is not a customer of the well-known banking institution, he/she will perceive more clearly the anomaly of this text message. In the case analyzed, however, the recipient  is actually a customer of the banking institution, and the message comes in the chat where the codes  to authorize credit card payments are delivered . Therefore, it is even more crucial to know how to recognize these, now widespread, attempts at computer fraud. Above all, it is important to remember that under no circumstances  banking institutions/payment circuits require customers to provide their payment card information through e-mail, text messages or call centers.

Clicca per ingrandire l'immagine del falso sito del Noto Istituto Bancario che cerca di indurre il malcapitato ad inserire le credenziali del suo account ma in realtà si tratta di una TRUFFA!
In the given example, we can first observe that the text message received is very generic. In fact, it addresses a ''Gentile cliente''  ('Dear Customer') without reporting any identifying information about the account holder, something very suspicious. Clearly, the intention of the cyber criminals is to urge the user to promptly click on the link to block the unauthorized payment.
As we can see from the image shown, the web page where you are redirected is really well done in that it simulates the official website of the banking institution, being reasonably misleading, both graphically and textually.
In fact, to reassure the user of the authenticity of the page, the cyber-criminals had the foresight to insert the authentic logo and set the page with the same graphics as the official website.

The access page for account management, however, is hosted on an anomalous address/domain that is not traceable to the official domain of the banking institution and which we report below:
"https://grupo***[.]com"
or
"https://um****nt[.]com"

Both links redirect to a web page, hosted on two different, graphically identical, domains.

By entering login information on this FORM, this information will be sent to a remote server and used by cyber crooks with all the associated easily imaginable risks.


 




January 11, 2024 ==> Phishing Account Posta Elettronica (Email Account)

SUBJECT: <New document from ***** Office admin>

We analyze below the phishing attempt that aims to steal the victim's e-mail account credentials.

Clicca per ingrandire l'immagine della falsa e-mail dell'amministratore dell'account di posta elettronica, che cerca di indurre il ricevente a cliccare sui link per rubare le credenziali di accesso all'account.
The message, in English, informs the recipient of a new shared document that appears to be sent by the mail account administrator. It then invites the victim to view the .pdf document by downloading it at the following link:

DOWNLOAD PDF


Analyzing the email, we notice that the message comes from an email address not  traceable to the server hosting the mailbox <kunze(at)thientranlong123(dot)shop>. This is definitely anomalous and should, at the very least, make us suspicious.

Clicca per ingrandire l'immagine del falso sito contraffatto che chiaramente non ha nulla a che vedere con il server dell'account di posta elettronica...
Anyone who unluckily clicks on the 
DOWNLOAD PDF

link, will be redirected to an anomalous WEB page, which, as we can see from the side image, is unrelated to the e-mail account manager.
The page to which we are redirected, to enter our mail account credentials, is hosted on an anomalous address/domain, which we report below:

https[:]//bafkreigsy7grro3oyncupnjsllqqz5n5twhe4up5n4pikouddrrab35c2i[.]ipfs....

We always urge you to be careful and not to enter your personal data and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber crooks with all the associated, easily imaginable, risks.



January 10, 2024 ==> Phishing Trenitalia

Below we analyze the following text message scam attempt that hides behind a false communication from Trenitalia.

Clicca per ingrandire l'immagine della falsa comunicazione che sembra provenire da Trenitalia...in realtà si tratta di una TRUFFA!
It is a text message referring to a ''Promozione di Capodanno'' (New Year's Promotion) that would allow only a lucky few to travel for free...or so it seems.
For many inexperienced users, it is certainly a real decoy.
After all, the vacation season has just ended, and some people are already thinking about planning their next vacation... a Trenitalia railcard  to travel for free is really tempting!

Clearly, Trenitalia is unrelated to the mass sending of these text messages, which are true scams whose goal remains, as always, to steal sensitive data of the unsuspecting recipient.

Therefore, keep your eyes open: all it takes to avoid unpleasantness is a little bit of attention and glance.

Clicca per ingrandire l'immagine del faso sito di Trenitalia dove viene proposta la partecipazione ad un sondaggio per provare a vincere una carta regalo...in realtà si tratta di una TRUFFA!
First of all, the ''landing'' page where we are redirected by clicking on the provided link, although graphically well done (with misleading images and the authentic Trenitalia logo), does not seem trustworthy at all.
In fact, the survey to obtain the prize, is hosted on the following anomalous web page:

"https[:]//wpclick[.]cc/....''

which has no connection with Trenitalia.

Cyber criminals masterminding the scam, try to trick the user into quickly completing the survey, under the pretext that there are only a few lucky people and that the gifts are about to run out.

To give added credibility, numerous comments from customers, who apparently participated in the survey, have also been reported. These testimonials/feedback are intended to confirm that the winnings are genuine and not a scam.
Surely if so many users have been lucky why not try your luck by filling out a simple survey?!

So here we are at the end of the survey.
Responses seem successfully submitted and saved. Now we can enjoy a simple little game to try our luck: we have 3 attempts to find the free gift card inside some gift packages...
Clicca per ingrandire l'immagine della videata al temine del sondaggio che ora invita l'utente a fare un semplice giochino per tentare la vincita...in realtà è una TRUFFA!
How lucky we are!!!
After 2 attempts we made it: we managed to get the Trenitalia gift card for 1 year of free travel....
Too bad it's not over yet... new instructions are provided to complete the winning.
Clicca per ingrandire l'immagine della videata con le istruzioni finali per finalizzare la vincita della carta regalo Trenitalia......in realtà è una TRUFFA!

Clicca per ingrandire l'immagine che conferma la vincita della carta regalo Trenitalia ma che è subordinata alla condivisione della ''promozione'' a più gruppi e contatti WhatsApp......in realtà è una TRUFFA!
Here's the surprise: as highlighted in the image, winning is dependent on sharing the promotion to multiple groups and contacts on WhatsApp. Once you complete the progress bar you will be able to enter your delivery address and complete the registration.
So not only an attempt to steal our sensitive data but also a kind of chain letter!!
The purpose in this case is to spread this scam attempt to as many contacts as possible.. in this way we become "accomplices" of the cybercriminal by spreading the "promotion" to our contacts.
To conclude, we always urge you to be wary of any message that asks you to enter confidential data, even if there are prizes or discount vouchers up for grabs, and avoid clicking on suspicious links which could lead to a counterfeit site, difficult to distinguish from the original one. This way, in fact, your most valuable data are put into the hands of cyber crooks who can use them for malicious purposes.


January 09, 2024 ==> Phishing Aruba - Fattura non pagata (Unpaid invoice)

SUBJECT: <Fattura non pagata 09/01/2024> (Unpaid invoice 09/01/2024)

Phishing attempts, pretending to be communications from the Aruba brand, continue this month.

Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare il rinnovo del dominio, ma in realtà è una TRUFFA!

The message informs the recipient that his/her domain hosted on Aruba, linked to his/her e-mail account, will expire on 09/01/2024. It then warns him/her that he/she will have to manually renew his/her services to avoid the deletion of the account and thus the deactivation of all services associated with it, including mailboxes, (and thus the ability to send and receive messages).
It then invites the user to log in to renew services, via the following link:


RINNOVA IL (RENEW THE)

Clearly, the well-known web hosting, e-mail and domain registration services company, Aruba, is unrelated to the mass sending of these e-mails, which are real scams whose goal remains, as always, to steal sensitive data of the unsuspecting recipient.

Analyzing the text of the message, we notice right away that the sender's e-mail address <postmaster(at)combellbe(dot)com> is not from Aruba's official domain.
In order to induce the victim to proceed with the renewal of his mailbox in a timely manner, the expiration date of 09/01/2024 is indicated ...which incidentally coincides with the date of receipt of the e-mail. Hence there is not much time available to make the renewal and prevent the deactivation of services. The indication of a brief deadline to conclude the procedure is, obviously, intended to push the user to act immediately and without much thought. 

Anyone who unluckily clicks on the link RINNOVA IL (RENEW THE), will be redirected to the displayed page.

Clicca per ingrandire l'immagine del falso sito di Aruba dove viene richiesto di effettuare il pagamento del rinnovo del dominio...in realtà si tratta di una TRUFFA!
This page, unlike what we expected, does not redirect to the login form of Aruba's RESERVED AREA but hosts an online payment form that seems to rely on the BancaSella circuit. Here the entry of the credit card data is requested to pay the modest amount of Euro 5.42.....
Although the hurry and the fear of email box suspension may push the user to quickly conclude the operation, we see from the url that the payment form is not on the official domain of Aruba or even BancaSella:

https[:]//fattura[.]site[.]ku5li1KgGYy6BBCpppr8f12PMka1pJlLzMOEx.....

Therefore, we urge you not to hurry and to remember that to avoid cyber fraud attempts, it is necessary to pay attention to every detail, even trivial ones.
By proceeding to enter the requested data, specifically credit card details, these will be delivered to the cyber-criminals creators of the scam, who will use them for criminal purposes.


January 13 - 09, 2024 ==> Phishing Account Posta Elettronica (Email Account)

We analyze below the following phishing attempts that aim to steal the credentials of the victim's e-mail account.

EXAMPLE 1
< Your account ***** password expire today >
EXAMPLE 2
«Removal of **** from *****»

In the examples above, in English, the customer is alerted that he/she needs to proceed to update his/her e-mail account. In the first example, the criminal communicates that the password is expiring and that the user must proceed within 3 hours to confirm that he/she wants to keep the same password otherwise a new one will be generated by the system. In the second example instead, the message, informs the recipient that in order to free up space in the database, inactive accounts are being deleted. Therefore, if users are not confirmed within 7 day, the account will be deleted
In both cases, the purpose is to get the user to click on the link in the email, using also a time limit to leverage the urgency of the message:

Keep Current Password  or Confirm *****

To recognize these phishing attempts, it is first necessary to analyze the sender's e-mail address, which as we can see in the 2 cases shown: <contact(at)polyflor(dot)co(dot)nz>; <dierenselaan(at)readshop(dot)nl> definitely do not come from the server hosting the mailbox.

Very often these messages are poorly written emails containing spelling errors or renewal requests for non-expiring services, as they leverage the urgency or data security to get the user to proceed to enter his/her data.

In addition, we should analyze the links or attachments of these messages, which usually redirect to a counterfeit website where we are asked to enter our personal information (such as account username and password) or personal information (such as credit card to make account renewals). If this information is entered, it would be used by cyber criminals for malicious purposes.
 

January 08, 2024 ==> Phishing MetaMask

«SUBJECT: <Immediate Action Required: Enable 2FA for Account Safety>

We analyze below a new phishing attempt aimed to steal the victim's cryptocurrency wallet login credentials of MetaMask, a San Francisco-based company.

MetaMask is a cryptocurrency software wallet used to interact with the Ethereum blockchain. It allows users to access their Ethereum wallet via a browser extension or mobile app.

Clicca per ingrandire l'immagine della falsa e-mail di Metamask, che cerca di rubare le credenziali di accesso all'account.
The message (in English) which we analyze below, informs the recipient that, in order to increase the level of security, all MetaMask users are being asked to activate two-factor authentication (2FA). To proceed, the user must click on the following link:

Activate 2FA

Analyzing the e-mail, we notice that the message comes from a highly suspicious e-mail address, not  traceable to the official MetaMask domain <tls6(at)ccb18089e0(dot)nxcli(dot)io>. This is definitely anomalous and should, at the very least, make us suspicious.

Clicca per ingrandire l'immagine del falso sito contraffatto di MetaMask per l'inserimento delle credenziali di accesso all'account...ma in realtà è una TRUFFA!
Anyone who unluckily clicks on the link Activate 2FA, will be redirected to an abnormal WEB page, unrelated to the official MetaMask's site, where you are requested to continue if you wish to proceed with 2-factor authentication.
The page to which you are redirected may be misleading in that the cyber criminal had the foresight to include the MetaMask logo. We see, however, that it is hosted on an anomalous address/domain, which we report below:

https[:]//activate-2fa[.]io/welcome

We always urge you to be careful and not to enter your personal data and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber crooks with all the associated easily imaginable risks.


 

January 09 - 07, 2024 ==> Phishing Mooney

Below we analyze the following phishing attempts that comes as a false communication from Mooney, the Italian Proximity Banking & Payments company.

EXAMPLE 1
< Messaggio importante
(Important message)
EXAMPLE 2
«[Notifica] Area Clienti!»
([Notification] Customer Area!)

In the examples above, the customer is told that, for security reasons, he/she must update his/her Mooney account otherwise he/she will no longer be able to use his/her card or his/her account will be temporarily blocked until he/she proceeds with the update.
The purpose is clearly to get the user to click on the link provided in the email:

Clicca qui per attivare
  o Accedi (Click here to activate or Login)

This time the phishing campaign simulates a communication from the Italian online payments company Mooney, which is clearly unrelated to the mass sending of these emails. These are real scams whose goal remains, as always, to steal sensitive data of the unsuspecting recipient.

To detect these phishing attempts, it is first necessary to analyze the sender's e-mail address which, as we can see in the 2 reported cases: <communications(at)venture(dot)org(dot)nz> <noreply(at)softpointcloud(dot)com>, definitely do not come from Mooney's official domain.

Very often these messages are poorly written emails with spelling errors or renewal requests for non-expiring services, as they leverage urgency or security of  users’ data to get them to enter their data.

In addition, we should analyze the links or attachments of these messages, which usually redirect to a counterfeit website asking for our personal information, such as our account username and password or personal information ( i.e. credit card details to make account renewals). If this information is entered, it will be used by cyber criminals for illegal purposes.


January 01, 2024 ==> Phishing Aruba - Fattura non pagata (Unpaid invoice)

SUBJECT:  <Fattura non pagata 01/01/2024 .> (Unpaid invoice 01/01/2024)

We find again in the new year, phishing attempts pretending to be communications from the Aruba brand.

Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare il rinnovo del dominio, ma in realtà è una TRUFFA!
The message informs the recipient that his/her domain hosted on Aruba, linked to his/her e-mail account, will expire on 01/01/2024. It then warns the victim that he/she will have to manually renew his/her services to avoid the deletion of the account and thus the deactivation of all services associated with it, including mailboxes ( and therefore the possibility to receive and send messages).
It then invites the user to log in to renew services, via the following link:

RINNOVA IL DOMINIO  (RENEW THE DOMAIN)

Clearly, the well-known web hosting, e-mail and domain registration services company Aruba, is unrelated to the mass sending of these e-mails, which are real scams whose goal remains, as always, to steal sensitive data of the unsuspecting recipient.

Analyzing the text of the message we notice right away that the sender's e-mail address is not from the official domain of Aruba, <aruba(dot)restaurantcastello(dot)ru>. This is definitely anomalous and should, at the very least, make us suspicious. However, that the cyber criminal had the foresight to include the well-known Aruba logo to make the message more trustworthy.

Anyone who unluckily clicks on the link RINNOVA IL DOMINIO (RENEW THE DOMAIN), you will be redirected to an anomalous WEB page that is unrelated to Aruba's official website, but which has already been reported as a DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals who want to get hold of your most valuable data in order to use them for illegal purposes.


A little bit of attention and glance, can save a lot of hassles and headaches..

We urge you NOT to be fooled by these types of e-mails, which, even though they use familiar and not particularly sophisticated approach techniques, if there is a resurgence, with reasonable likelihood more than a few unfortunates will be fooled.
 
We invite you to check the following information on Phishing techniques for more details:

11/12/2023 09:39Phishing: the most common credential and/or data theft attempts in  December 2023.
03/11/2023 08:58 - Phishing: the most common credential and/or data theft attempts in November 2023...
03/10/2023 16:35Phishing: the most common credential and/or data theft attempts in October 2023...
05/09/2023 10:35 - Phishing: the most common credential and/or data theft attempts in September 2023...
01/08/2023 17:33 - Phishing: the most common credential and/or data theft attempts in August 2023..
03/07/2023 10:23Phishing: the most common credential and/or data theft attempts in July 2023..
07/06/2023 15:57Phishing: the most common credential and/or data theft attempts in  June 2023..
03/05/2023 17:59Phishing: the most common credential and/or data theft attempts in  May2023....
05/04/2023 17:34 - Phishing: the most common credential and/or data theft attempts in April2023..
03/03/2023 16:54 - Phishing: the most common credential and/or data theft attempts in  March 2023..
06/02/2023 17:29 -Phishing: the most common credential and/or data theft attempts in  February 2023..
02/01/2023 15:28Phishing: the most common credential and/or data theft attempts in  January 2023..

Try Vir.IT eXplorer Lite

If you are not yet using Vir.IT eXplorer PRO, it is advisable to install Vir.IT eXplorer Lite -FREE Edition- to supplement the antivirus in use to increase the security of your computers, PCs and SERVERS.

Vir.IT eXplorer Lite
has the following special features:
  • freely usable in both private and corporate environments with Engine+Signature updates without time limitation;
  • fully interoperable with other AntiVirus software and/or Internet Security products (both free and commercial) already installed on your computer. It doesn't need any uninstallation and it doesn't cause slowdowns, as some features have been appropriately reduced to ensure interoperability with the AntiVirus software already on your PC/Server. This, however, allows cross-checking through the scan;
  • it identifies and, in many cases, even removes most of the viruses/malware actually circulating or, alternatively, allows them to be sent to the C.R.A.M. Anti-Malware Research Center for further analysis to update Vir.It eXplorer PRO;
  • through Intrusion Detection technology, also made available in the Lite version of Vir.IT eXplorer, the software is able to report any new-generation viruses/malware that have set in automatically and send the reported files to TG Soft's C.R.A.M
  • proceed to  download Vir.IT eXplorer Lite from the official distribution page of TG Soft's website.
 

VirIT Mobile Security AntiMalware ITALIAN for ALL AndroidTM Devices

VirIT Mobile Security Italian Anti-Malware software that protects Android™ smartphones and tablets, from Malware intrusions and other unwanted threats, and empowers the user to safeguard their privacy with an advanced heuristic approach (Permission Analyzer).
 

VirIT Mobile Security l'Antimalware di TG Soft per Android(TM)

TG Soft makes VirIT Mobile Security available for free by accessing the Google Play Store market (https://play.google.com/store/apps/details?id=it.tgsoft.virit) from which you can download the Lite version, which can be freely used in both private and corporate settings.

 

You can upgrade to the PRO version by purchasing it directly from our website=> click here to order



Acknowledgements

TG Soft's Anti-Malware Research Center would like to thank all users, customers, reseller technicians, and all people who have transmitted/reported material attributable to Phishing activities to our Research Center, that allowed us to make this information as complete as possible.



How to submit suspicious emails for analysis as possible phishing but also virus/malware or Crypto-Malware

You can submit materials to TG Soft's Anti-Malware Research Center safely and free of charge in two ways:
  1. any suspect email can be sent directly by the recipient's e-mail, to the following mail lite@virit.com,choosing as sending mode "Forward as Attachment" and inserting in the subject section "Possible phishing page to verify" rather than "Possible Malware to verify";
  2. save the e-mail to be sent to TG Soft's C.R.A.M. for analysis as an external file to the e-mail program used. The resulting file must be sent by uploading it from the page Send Suspicious Files (http://www.tgsoft.it/italy/file_sospetti.asp). Obviously if you want a feedback on the analysis of the data submitted, you have to indicate an e-mail address and a brief description of the reason for the submission (for example: possiible / probable phishing; possible / probable malware or other).
For more details on how to safely forward suspicious e-mails, we invite you to consult the following public page: How to send suspicious emails for analysis
We provide all this information to help you prevent credential theft, viruses/malware or, even worse, next-generation Ransomware / Crypto-Malware.


TG Soft's C.R.A.M. (Anti-Malware Research Center)

 

 
Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: