Fake Subpoenas Sent To CEOs For Social Engineering 112
An anonymous reader writes "The Internet Storm Center notes that emails that look like subpoenas are being sent out to the CEOs of major US corporations. The email tries to entice the victim to click on a link for 'more information.' According to the ISC's John Bambenek: 'We've gotten a few reports that some CEOs have received what purports to be a federal subpoena via email ordering their testimony in a case. It then asks them to click a link and download the case history and associated information. One problem, it's [totally] bogus. It's a "click-the-link-for-malware" typical spammer stunt. So, first and foremost, don't click on such links. An interesting component of this scam was that it did properly identify the CEO and send it to his email directly. It's very highly targeted that way.'"
Subpoena by *email* ?? (Score:5, Insightful)
Re:Subpoena by *email* ?? (Score:4, Interesting)
Re: (Score:1)
Re:Subpoena by *email* ?? (Score:4, Insightful)
Cripes most virus infections at corperations come from these dimrods.
Re: (Score:3, Insightful)
If you're an experienced executive you should at least realize that you need to be served with a subpoena, and e-mail isn't a valid method of service (yet). Oh well, business majors aren't known for their intellectual sharpness...
Re: (Score:1, Informative)
One problem that I've noticed is that muckity-mucks often feel that they're "above" being targeted by such menial things as malware.
Us "Muckity-Mucks" are targeted by more malware, spam, telemarketing than any of you "little people" (tongue in c
Re:Subpoena by *email* ?? (Score:5, Informative)
BUT, if the only known way to contact a defendant or witness is by email (if, for example, their real names or addresses are unknown), then a court can authorize that as an alternative form of service. It's up to the court to decide if email would give sufficient notice and other means are impractical.
Here, of course, there's no reason to think that sending certified mail or a process server wouldn't work -- a corporate CEO isn't hard to find and service on a company can almost always be done through the state's secretary of state.
But, that doesn't mean that electronic subpoenas are never possible, as you suggest.
Re: (Score:3, Funny)
Re:Subpoena by *email* ?? (Score:5, Informative)
Most states have similar laws that allow service by any practical means if conventional methods fail.
Re: (Score:2)
Re: (Score:2)
That court was ignorant if they actually allowed email to be considered.
Re: (Score:2)
Re: (Score:1)
This actually was the original premise of The Black Hole [imdb.com], but then sanity prevailed and they realized this would only appeal to very geeky lawyers and process-servers.
Dr. Hans Reinhardt was actually supposed to be the leading process-server of his time, undaunted by the prospect of being crushed by a black hole in the pursuit of his quarry... ;)
Re: (Score:2)
--Eli Wallach, The Magnificent Seven
rj
Re: (Score:2)
Re: (Score:2, Informative)
A few phone calls and cross-checks with other resources later, it turned out to be valid.
Re: (Score:1)
Re: (Score:2)
The link didn't w
Re: (Score:1)
You already have real problems. (Score:5, Insightful)
If clicking a link poses even the slightest risk, you need to replace your software ASAP.
Websites don't "run" malware; users download and install malware with execution privileges. Or their defective user agents do it for them. CEOs don't need defective user agents. I'm not sure who does.
Re:You already have real problems. (Score:4, Informative)
Re: (Score:1)
If it's a subpoena sent to them in their personal capacity it goes straight to them (or their attorney if he/she has accepted service on their behalf).
Re: (Score:2)
Re:You already have real problems. (Score:5, Funny)
Re:You already have real problems. (Score:5, Funny)
If you're going to make a joke on slashdot, you gotta at least register the domain and build a website, or nobody will take you seriously.
Re: (Score:1)
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:1, Redundant)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:1)
What would you suggest replacing it with? Arbitrary-execution bugs have cropped up in every major browser (yes, even lynx [secunia.com]) from time to time, and often the bad guys know about them first. Ditto with common browser plugins. Hopefully your browser is not running with root privileges, but probably it has full access to your personal files -- and besides, privilege escalation bugs are also constantly being discovered.
Re: (Score:2)
If clicking a link poses even the slightest risk, you need to replace your software ASAP.
Websites don't "run" malware; users download and install malware with execution privileges. Or their defective user agents do it for them. CEOs don't need defective user agents. I'm not sure who does.
Let me play devil's advocate for a moment.
Knowing (as discussed elsewhere) that email, while unusual, is in some circumstances a perfectly acceptable way to serve a subpoena, no responsible CEO is going to ignore the email unless pretty damn convinced that it's fake.
A user agent saying "Where do you want to save this?" won't help. All that will happen is they'll save it somewhere then run it from there.
The only solution is for the OS to actively prevent the end-user from executing code from random locatio
Someone had to say it... (Score:1)
Risk/Benifit - and insider trading (Score:2)
Re: (Score:2)
Hmmm.... (Score:3, Insightful)
Clever scheme, though.
Re: (Score:1, Funny)
I hope he appreciates the extra business i'm sending his way.
Re: (Score:3, Informative)
Re: (Score:2)
Boss got this yesterday (Score:5, Interesting)
Also - I wonder... Is there some "hacker code" out there that says if you are sending out a phishing email - you must misspell at least a few words? Cause these subpoenas looked fairly good - but there were misspellings. Can't they just run the emails through Word or Open Office before they send them out?
Re:Boss got this yesterday (Score:4, Funny)
Re:Boss got this yesterday (Score:4, Funny)
Re: The Hacker Code -- REVEALED (Score:1)
2. Don't talk about the hacker code.
3. ????????
4. PROFIT.
Re: (Score:1)
P.S. I could never get my head around this recursion.
Re: (Score:1)
Re: (Score:1)
Click [addict.net.nz] if you want to have a read.
Re: (Score:2, Informative)
Re: (Score:3, Interesting)
Yes there is. By mispelling [sic pun] a few words, you can confuse anti-spam filters that are looking for duplicate mass mailed documents or for specific words. Typical spamming programs will allow you to insert random chars (replace 1, l or ! for I) or will substitute some automatically.
That might help it get past the spam filter, but it certainly doesn't help it get past the "Me" filter. *I* will recognize the email as a phish based on a SINGLE misspelling. The problem isn't getting past the filters,
Re: (Score:2, Informative)
Re: (Score:1)
It's not as big a problem as you'd think.
Re: (Score:2)
Re: (Score:2)
But in this case it was targeted to only one user per company. Perhaps something big like Postini or pyzor could have caught it eventually.
Agreed (Score:1, Interesting)
The admin actually was quoted as saying "Since when are they sending subpoenas by email?".
Re: (Score:1)
Re: (Score:2)
Count Your Blessings (Score:2)
Imagine if the smart guys started working on these things...
To be on the safe side ... (Score:2, Funny)
I have been saying this... (Score:3, Interesting)
The real danger lies elsewhere. Stories like this and the cyber-war story about the US and China are the ones that you need to follow and think about.
The chances that your company is already compromised by the NSA or some other country's spy agency/military is reasonably high, no matter what you do.
Okay, so you make cheeseburger boxes for several chain restaurants, who would want data from your system?
It looks a lot like the butterfly effect http://en.wikipedia.org/wiki/Butterfly_effect [wikipedia.org] in the fact that one small chance encounter or small piece of information can greatly affect the outcome of a particular chain of events. Your company makes cheeseburger boxes for a company whose CEO, in turn, is a friend of or associate of some political figure. This information is gleened from your system via email, and phishing email is used to get that political figure to open an email which is a dupe of a previous email sent, but contains an active-x payload... this in turn leads to more serious and useful information down the road... and viola! you have enough for a hack on the RNC mail server...
Something like that, just work out your own end goal and play 6 steps to Kevin Bacon to find out how to get there. Much is public information and can be used to nail the last link you need for planting the right spyware in the right place, unnoticed, undetected, unfettered. No need for millions of bots, just one well placed piece of code.
Best part is that it is enabled/started by the high-ranking user, one that is never spied on, so the malware is safely sitting there doing it's thing without interruption.
That is how spying works, a little bit at a time, patiently looking for a chink in the armor.
Re: (Score:1)
Re: (Score:2)
Re:I have been saying this... (Score:5, Informative)
The real danger lies elsewhere. Stories like this and the cyber-war story about the US and China are the ones that you need to follow and think about.
It looks a lot like the butterfly effect http://en.wikipedia.org/wiki/Butterfly_effect [wikipedia.org] in the fact that one small chance encounter or small piece of information can greatly affect the outcome of a particular chain of events. Your company makes cheeseburger boxes for a company whose CEO, in turn, is a friend of or associate of some political figure. This information is gleened from your system via email, and phishing email is used to get that political figure to open an email which is a dupe of a previous email sent, but contains an active-x payload... this in turn leads to more serious and useful information down the road... and viola! you have enough for a hack on the RNC mail server...
That is how spying works, a little bit at a time, patiently looking for a chink in the armor.
Reminds me of the information security training I had to take before starting my job here at a national lab. First, we watched a video in which an ex-KGB boss who now provides security consulting worldwide says, "Do not think that because you are low-ranking or do not work with classified information, that you are not a potential target for espionage" and goes on to tell us how almost certainly at least a few of the people we work with have been or will be targeted for espionage or potential defection. Then we were told how several pieces of non-classified information can be put together to create classified information, even unintentionally.
Even if you don't work for the government, you have to be really careful if you want your data to be secure.
Re: (Score:1)
When I'm doing a pentest, I often look into websites that known users of my victim site frequent, to get more info about possible passwords, social engineering fodder, or other info. It rarely gives huge returns, but you can usually get something this way, and that's often all you need.
And even if your company's servers dont' have the information I'm looking for, I could always use it as a proxy while attacking the real target, to send the blame your way while I'm working for your
Re: (Score:2)
You missed the obvious.. The Acrobat.exe.. It's another Microsoft Windows Virus.
CEOs read email? (Score:1, Informative)
Re: (Score:2)
Re: (Score:2)
An email subpeona? (Score:2)
I like to look (Score:2)
Would I fail the test then?
Re: (Score:2)
Re: (Score:2)
Yeah, my free copy of Avast! antivirus (home edition for non-commercial use) notifies me when I click on something malicious, and gives me a chance to opt out of downloading it. Additionally, Spybot Search & Destroy's "TeaTimer" prompts me before any application attempts to edit the registry (which shady websites love to do). On top of all that, Firefox is my default browser, and most ActiveX controls are disabled or prompt-to-download by default (as they should be).
No, I am not a shill.
Re: (Score:2)
Translation: PWND
http://www.virustotal.com/analisis/13bfb6913f9c328c7b657fce4ba4c731 [virustotal.com]
Re: (Score:2)
Assuming someone could trick me into running a malicious executable. It's usually pretty obvious -- like those "porn videos" on yahoo vid. search that link you to a site that's all like, "error! you must download this blah thing to see nekkid ladies!"
Being able to distinguish an executable from a family vacation photo or tax spreadsheet is what separates the users from the lusers.
Re: (Score:1)
Re: (Score:2)
Unfortunately, I forgot to shut off networking to the vm, and the next day I got an email nastygram from my ISP saying that my port 25 had been blocked due to spamming...
Etch a Sketch (Score:5, Funny)
Re: (Score:1)
Re: (Score:2)
http://www.crobike.de/en/store/product.php?whm=22214&kat=FunStressRelievers&will=Crayons&country=Worldwide [crobike.de]
Highly targeted? (Score:2)
"emails that look like subpoenas " (Score:2)
Looks like I gotta change my job site profile. 'CEO' isn't that hard a job to fake, apprently. At least I won't be as easily phished as the current spawn.
How will he click it? (Score:3, Funny)
I was hit by it... (Score:5, Informative)
Then I noticed that it was a grand jury for a civil trial. So I'm wondering, do they use grand jury's for civil trials? It was in California, so I thought maybe they somehow did. Then, I could see that they wanted a credit card to get the information. Big red flag, but it used pricing by the page - so I thought only the government could dream up something like this and maybe it was legit. Finally, the domain name for the link to the credit card page looked okay, but it was phony.
All and all, I'll bet a number of people fell for it because the targeting was so good.
Amazing (Score:1)
Subpeona = SPAM (Score:1)
Zienth
easily done (Score:3, Insightful)
Makes for easy spamming...
I would be more concerned that... (Score:2)
CEOs read their own mail?! (Score:1)
CEOs read their own mail?!
Never would have believed if I hadn't read it here :)
That's nothing (Score:5, Funny)
Re: (Score:2)
You might want to ask what all those checks written out for Russian banks are about.
Typical (Score:2)
CEO's don't read e-mail (Score:1)
I got a good phish last week (Score:2)
These guys are spending big dollars to set up a 1-800 number. I guess they get it all back in one or two victims.