chat
expand_more

DHL Impersonated in Shipping Return Scam

April 1, 2020

As the world is stuck inside, shipping items has increased and cybercriminals are taking notice. In a recent scam, attackers created an email to impersonate DHL and claimed that a package intended for the recipient was been returned to the sender. As a result, the recipient must pay €50 in order to deliver the package.

Summary of Attack Target

  • Platform: Office 365
  • Email Gateway: Proofpoint
  • Victims: Employees
  • Payload: Malicious Link
  • Technique: Impersonation

Overview of the DHL Shipping Scam

In the email, attackers claim that the recipient must visit a website and pay €50 to obtain a PIN code, which they must then send to an email address (ostensibly DHL, but actually an email address for the attackers) in order for their package to be delivered.

This attack itself uses no malicious links, as the link to obtain the PIN that attackers request is a legitimate service known as Paysafecard. However, it should be noted that DHL would never ask its customers to use this service to have a package delivered.

Additionally, the email that the attackers ask recipients to send the PIN to is different from the email displayed. The attackers write that the email to send the PIN to is notification@dhl.com, but the link actually directs victims to an email address controlled by the attackers.

Those who fall victim to this attack will lose the €50 that is paid to the attackers. While this isn't a large sum of money, it does showcase how attackers can make thousands from a single email sent to multiple people.

Why This DHL Shipping Scam is Effective

As with many attacks, this one leverages urgency to ensure that victims scrutinize the email less than they might otherwise. In this case, the email claims that "You have exceeded the delivery time," which puts pressure on the recipient to act quickly.

There is also the case of the hidden URL. Although the email that the attackers ask their victims to send the PIN to is written as notifications@dhl.com, the embedded link actually has victims sending the PIN to an email controlled by the attackers. If victims don't check the email before sending the PIN, they would have no idea that it's being sent somewhere other than where they expected. Furthermore, the attack leverages a legitimate service in Paysafecard that is used to pay for items.

Abnormal is able to stop this attack due to a variety of reasons. Most notably, email authentication is failing and the sender's display name matches a known brand, but has an abnormal email signoff that indicates it may be suspicious. Combined with the suspicious link and the financial instructions, this provides the basis for discovering the malicious attack.

To learn more about how Abnormal can protect you from shipping scams and other advanced threats, see a demo of the platform today.

DHL Impersonated in Shipping Return Scam

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More
B Why MFA Alone Will No Longer Suffice
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Read More
B NLP
Learn how Abnormal uses natural language processing or NLP to protect organizations from phishing, account takeovers, and more.
Read More
B DK Compromise 7 11 24
Discover the top five ways hackers compromise accounts, from exploiting leaked API credentials to SIM swapping partnerships, and more. Learn how these techniques enable account takeover (ATO) and pose risks to enterprises.
Read More
B Sans Recap 7 11 24
Discover trends among modern SOC teams, including misaligned budgets, increased automation, unsatisfactory AI tools, staffing issues, and more.
Read More