Chasing the honeypot. Email scammers target your finances with a week of MYOB, Xero and Sage cyberattacks.

Posted by Daniel McShanag on 21 September 2017 10:58:38 AEST

Forever popular with cybercriminals, this week has seen a series of email scams going directly for the money-jar. Leveraging major accounting software brands that are popular with the SMB segment – like MYOB, Xero and Sage – the cybercrime networks may be chasing smaller businesses who don’t have dedicated infosec or IT help to defend against scams.

Starting at 8:45am AEST on Tuesday, MailGuard blocked two email scams throughout the day purporting to be from accounting software mainstays MYOB and Xero.

The MYOB scam claimed to be sending recipients a supply order for signature, with a DocuSign link to a malicious .ZIP download. With the subject ‘Your MYOB supply order’ the email was sent from randomized names ‘via DocuSign’ with a reply to: address of the random name, for example David(dot)Conlan @ myob.com.  

Your MYOB Supply Order - Mozilla Thunderbird_125-1.png

The Xero attack was delivered at the same time as the MYOB scam, and masqueraded as an invoice for your Xero subscription sent from ‘Xero Billing Notifications’ with a subject that reads ‘Your Xero Invoice INV-1815584’ in the example below. Again the link to ‘View your bill:’ leads to a malicious .ZIP payload.  Your Xero Invoice INV-1815584 - Mozilla Thunderbird_122.png

Not content, with the success of the Xero and MYOB scams earlier on Tuesday, from 6:14pm AEST Tuesday, MailGuard began blocking yet another scam targeting Sage accounting which continued into the early hours of Wednesday morning.

Sage_email_200917-masked.png

Like the Xero attack, the Sage scam imitated a subscription invoice. The email linked to a compromised SharePoint site hosting a .Zip archive with a malicious JavaScript file.

The display name for the attack was Sage, with a sending and display address of noreply@sageim(dot)com. The sending domain sageim(dot)com was registered on the 18th of September with a registrar in China.

This morning the MailGuard team are busy blocking a brand-new scam pretending to be from an accountant at an accounting practice that links to a fake tax return link with another malicious payload, titled ‘Tax return for [name].’ Income Tax Return for John - Mozilla Thunderbird_136[5].png

These emails are being sent from a compromised MailChimp account so the sending addresses are unique to each message. The link is to a benign .docx file hosted on MailChimp, however the .docx file contains 2 x OLE objects, both of which are CDF documents and can be opened in Microsoft Word or Excel.

The CDF documents themselves contain malicious macros, which are presumed at this stage to download a remote executable. Similar to an attack that MailGuard blocked Wednesday, this tactic is employed by the cybercriminals to bypass content scanners by hiding the malicious code in an embedded object within the document.

Finance departments that regularly deal with payments or accounting practices need to be extra cautious what they click this week. Who knows what tomorrow may bring?

MailGuard urges email users to hesitate before clicking any type of attachment or link in an email if they’re uncertain of its legitimacy.

For a few dollars per staff member per month, add MailGuard's cloud-based email and web security to your business security. You’ll significantly reduce the risk of new variants of malicious email from entering your network.

Keep Informed with Weekly Updates

 

^ Back to Top

Topics: Malware email scam Cybersecurity cybercrime Survivingcybercrime cybercrime statistics hoax email brandjacking Australian brands

Back to Blog

Comments:


Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Recent Posts

Posts by Topic

see all