DHL Impersonated in Shipping Return Scam

April 1, 2020

As the world is stuck inside, shipping items has increased and cybercriminals are taking notice. In a recent scam, attackers created an email to impersonate DHL and claimed that a package intended for the recipient was been returned to the sender. As a result, the recipient must pay €50 in order to deliver the package.

Summary of Attack Target

  • Platform: Office 365
  • Email Gateway: Proofpoint
  • Victims: Employees
  • Payload: Malicious Link
  • Technique: Impersonation

Overview of the DHL Shipping Scam

In the email, attackers claim that the recipient must visit a website and pay €50 to obtain a PIN code, which they must then send to an email address (ostensibly DHL, but actually an email address for the attackers) in order for their package to be delivered.

This attack itself uses no malicious links, as the link to obtain the PIN that attackers request is a legitimate service known as Paysafecard. However, it should be noted that DHL would never ask its customers to use this service to have a package delivered.

Additionally, the email that the attackers ask recipients to send the PIN to is different from the email displayed. The attackers write that the email to send the PIN to is notification@dhl.com, but the link actually directs victims to an email address controlled by the attackers.

Those who fall victim to this attack will lose the €50 that is paid to the attackers. While this isn't a large sum of money, it does showcase how attackers can make thousands from a single email sent to multiple people.

Why This DHL Shipping Scam is Effective

As with many attacks, this one leverages urgency to ensure that victims scrutinize the email less than they might otherwise. In this case, the email claims that "You have exceeded the delivery time," which puts pressure on the recipient to act quickly.

There is also the case of the hidden URL. Although the email that the attackers ask their victims to send the PIN to is written as notifications@dhl.com, the embedded link actually has victims sending the PIN to an email controlled by the attackers. If victims don't check the email before sending the PIN, they would have no idea that it's being sent somewhere other than where they expected. Furthermore, the attack leverages a legitimate service in Paysafecard that is used to pay for items.

Abnormal is able to stop this attack due to a variety of reasons. Most notably, email authentication is failing and the sender's display name matches a known brand, but has an abnormal email signoff that indicates it may be suspicious. Combined with the suspicious link and the financial instructions, this provides the basis for discovering the malicious attack.

To learn more about how Abnormal can protect you from shipping scams and other advanced threats, see a demo of the platform today.

DHL Impersonated in Shipping Return Scam

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 30 23 Teams
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Read More
Zoom BC
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Read More
B 5 22 23 SOC
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to Phishing attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More