Tuesday, July 10, 2012

favorite malware message o' the day...

Just received this (with a little malware zip hanging on for the ride) and it made me laugh.

[some headers clipped]

Received-SPF: softfail (google.com: best guess record for domain of transitioning EmilyVulich@comcast.com does not designate as permitted sender) client-ip=;
Return-path: <EmilyVulich@comcast.com>
Received: from [] by mx1.comcast.com; Tue, 10 Jul 2012 09:54:50 -0500

From: Logistics Express <accountservices@ups.com>
To: me
Subject: You have urgent work
Date: Tue, 10 Jul 2012 09:54:50 -0500

Hi, track

We got today a letter from tax dpeartment they writing that we have not paid all needed taxes. You must urgent clear this shit other way they are freeze our bank accuonts.

I have scanned the letter for you, you will find it in attach. Clear this situtaion and write me back.

Of course, the headers weren't visible...

But seriously, even without the headers, how does this kind of thing ever work?

Even if I ignore the bad grammar & spelling, and expect that most end users wouldn't check the headers & wonder why EmilyVulich@comcast would have sent a message as accountservices@ups through a channel that doesn't conform to the Sender Policy Framework...Okay, I get that there's only a handful of us that even know how to look at things like that...So ignoring all of that...why would I ever believe that an error paying taxes on my part would lead to UPS having their bank accounts frozen?

Good stuff. Thanks, Anonymous Malware Spammer, for the laugh.

this guy seems legit.

No comments:

Post a Comment