cellio: (avatar)
Monica ([personal profile] cellio) wrote2015-12-11 10:45 am
Entry tags:

what's the deal with this phish?

I see a lot of phishing attempts and more than a few spear-phishing attempts, but a recent one is leaving me wondering what the phishers were trying to do.

A couple days ago I got email, purportedly from eBay, acknowledging my new account. The email came to my Gmail address, which I don't publicly use but is easily guessable. The account had a goofy name starting with the first few letters of my email address.

Whenever I think there could be an unauthorized account in my name on a real service I try to reset its password, just in case. So I fired up an incognito window and went to eBay (really eBay, not using the link in the email), went to the login page, gave that account name, and clicked "forgot password". This generated email to me -- which means, I think, that an account of that name really was created (not by me). I reset the password.

While I was there I checked the transaction history and looked for private information. That was all clean. I initiated an account-deletion request, choosing "concerns about identity theft" from their menu of reasons. (Aside: eBay's short list of deletion reasons includes "concerns about identity theft"!) eBay holds such requests for a week to ensure that transactions close, even if there are no transactions (I consider the latter a flaw). I set a reminder to check back in a week.

A day later (just about 24 hours, in fact), I got password-reset email, identical to the email my own reset request had generated (other than the specific link).

Now if the phishers tried to log in and clicked "forgot password", they should already know that that would only work if they could intercept that email. I am as confident as I can be without server access that my Gmail account has not been compromised (I'm very careful about that), but I nonetheless changed my password and reviewed recent access logs. No new devices had accessed my account in this timeframe.

It is always possible, of course, that I am dealing with somebody who is just inept. But if this is a viable attack vector, what's the deal? How is it supposed to work? How does creating an account on eBay attached to an email address you can't access help you?

[identity profile] nancylebov.livejournal.com 2015-12-11 04:08 pm (UTC)(link)
I believe spammers don't necessarily write their own spam, sometimes they buy it. It wouldn't surprise me if some of the spam they buy is of poor quality.

[identity profile] dagonell.livejournal.com 2015-12-11 04:29 pm (UTC)(link)
I haven't been on Ebay in quite some time. Is it possible to say 'send the item to this physical address and the bill to this email address'?

[identity profile] anastasiav.livejournal.com 2015-12-11 06:40 pm (UTC)(link)
Another option might be that someone doesn't know how to spell their own email address. There is a person out there whose name is similar to mine except for the difference of one letter. I used to pretty frequently get stuff of theirs (kohl's rewards, once a sign up for "Christian Singles over 50" website) because they would miskey their own email address as mine.

In this case I'd say maybe less phishing and more inept internet user.

[identity profile] metahacker.livejournal.com 2015-12-11 10:21 pm (UTC)(link)
+1. There is someone in Florida who is convinced my email address is hers and keeps giving it to her friends and signing up for stuff with it.
siderea: (Default)

Passthrough!

[personal profile] siderea 2015-12-12 06:52 am (UTC)(link)
I see how this can work.

0) Create an account on Ebay for a known email address.

1) Rip the skin off Ebay and slap it on your own website, named something like www.ebay.com.ebaysomethingdomain.com.

2) Edit the javascript capture any user submitted auth tokens before passing them along to real Ebay, so that when user submits username/password on the fake site, it really does log you in to (and pass you along to) Ebay, but keeps a copy. (This can be either logging in as a kind of virtual client of Ebay, or simply snagging your credentials and sending you to use real Ebay.)

3) Email the email account with the link to the bogus passthrough website.

4) Wait for user to log into the account through the URL in the email, to the passthrough website. If the user doesn't notice the URL is bogus in the email, everything(?) subsequently will look legit because they will be using real Ebay's skin.

5) Profit.

If they can get you to follow their URL, they don't need to read your email.

ETA: which is a hell of a lot of effort for spearphishing. Another vote for clueless user.
Edited 2015-12-12 06:54 (UTC)
goljerp: Photo of the moon Callisto (Europa)

Re: Passthrough!

[personal profile] goljerp 2015-12-13 12:46 pm (UTC)(link)
Ah, but sometimes it's www.ebæy.cøm (or something that looks even closer).