Phishing of DHL Accounts
Updated: Jul 20
Phishing is a very common way to acquire personal information such as usernames, passwords or financial information. Today we are going to discuss a real-life example of an elementary phishing e-mail from the fake DHL page.
DHL phishing case study
Let’s analyze the following e-mail:
As you can see from the screenshot, the attachment represents the htm page which the unsuspecting “parcel recipient” is advised to download.
If we look inside this document, we will see JS code containing a Unicode string value encoded with the help of “escape” function:
To decode this fragment we can use, for example, the following resource:
After decoding it becomes obvious that this is not the end and the text is still encoded, but this time using “base64”:
Ok, well, let’s decode this one as well. As a result, we have a code of the page run locally, which imitates the official DHL page and obviously fits for collecting DHL account e-mail addresses and passwords:
Among other things, the body of the page contains a link to the resource:
When attempting to visit the resource you are immediately redirected to the DHL website so that the user could make sure he/she is really on the DHL website without suspecting anything while checking the link in the browser:
Judging by traffic, there is a post that transfers passwords and e-mail addresses that we entered on the false page, and then, just as expected, it redirects you to the DHL website.
So, what you can see is the actual phishing of DHL accounts.
All that is left to do is to block the link through firewalls and remind users once again to be very suspicious about it, and to double-check the links asking for their passwords.
If you wish to learn more about ISSP Reverse Engineering services, please contact us using the form below