- A phishing marketing campaign is spoofing DHL emails to steal login credentials
- Victims are tricked with a faux waybill affirmation and staged validation steps
- Captured knowledge, together with passwords and machine particulars, is shipped on to attacker mailboxes
Forcepoint has printed a report about an ongoing phishing marketing campaign designed to steal individuals’s DHL login credentials.
It begins by sending an electronic mail to the sufferer, asking for affirmation of a waybill. Whereas the e-mail itself appears genuine, and is designed in the identical vogue official DHL emails are, this one is straightforward to identify as faux – the area getting used to ship the message is cupelva[.]com – fully unrelated to DHL.
However many individuals don’t double-check the sender’s handle, so it’s protected to imagine some may fall for the trick and click on on the “Affirm Waybill Info” button included with the message.
Article continues under
Chances are you’ll like
Manipulating the notion
When that occurs, the victims are redirected to a malicious touchdown web page the place they’re first requested to kind within the parcel code offered on the display screen. Clearly, all the factor is faux, and constructed solely to get the sufferer to decrease their guard and belief the method.
“This web page is designed to appear to be a cargo validation step. It’s not an actual OTP mechanism,” Forcepoint stated. “This step serves no authentication operate. It exists to govern the sufferer’s notion of the workflow.”
After typing within the numbers proven on the display screen, the web page waits for a couple of seconds, to get the sufferer to assume that one thing is de facto being analyzed within the backend. After that, the sufferer is redirected to a second web page, the place they’re requested to supply their login credentials.
That is the place the theft occurs, and if the victims do find yourself offering the password, will probably be relayed, through electronic mail:
“The package initializes EmailJS and sends the captured knowledge utilizing the configured service and template. The attacker mailbox is slatty077@tutamail[.]com,” Proofpoint added. In addition to the e-mail and the password, the marketing campaign additionally captures the victims’ IP addresses, machine particulars, and placement knowledge.
“Phishing doesn’t want technical sophistication to succeed,” Proofpoint careworn. “This marketing campaign works as a result of it feels atypical. The DHL branding is acquainted, the verification step appears official, and the login type seems to substantiate one thing the sufferer already began. None of it’s actual.”
The very best antivirus for all budgets
Our high picks, primarily based on real-world testing and comparisons
Comply with TechRadar on Google Information and add us as a most popular supply to get our skilled information, critiques, and opinion in your feeds.

