Phishing of DHL Accounts

Updated: Apr 25, 2019

Hello everyone! Today we are going to discuss a case study of elementary phishing and, as usual, it’s a real-life example. Let’s analyze the following e-mail:

As you can see from the screenshot, the attachment represents an htm page which the unsuspecting “parcel recipient” is advised to download.

If we look inside this document, we will see JS code containing a Unicode string value encoded with the help of “escape” function:

To decode this fragment we may use the following resource, for example:


After decoding it becomes obvious that this is not the end and the text is still encoded, but this time using “base64”:

Ok, well, let’s decode this one as well. As a result, we have a code of the page run locally, which imitates the official DHL page and obviously fits for collecting DHL account e-mail addresses and passwords:

Among other things, the body of the page contains a link to the resource:

On attempting to visit the resource you are immediately redirected to the DHL website so that the user could make sure he/she is really on the DHL website without suspecting anything while checking the link in the browser:

Judging by traffic, there is a post that transfers passwords and e-mail addresses that we enter on the false page, and then, just as expected, it redirects you to the DHL website.

So, what you see is actual phishing of DHL accounts.

All that is left to do is block the link through firewalls and remind users once again to be very suspicious about, and double-check the links asking for their passwords.

54 views0 comments

Recent Posts

See All