Thursday, 20 July 2017

YouCanHasJob!: A closer look at a job-offer-scam email

Today, something suspect slipped through the Gmail spam scanners, and made it into my Inbox. That is highly unusual. I decided to take a closer look to try and discover why. Along the way, I’ll point out the obvious clues to these fake job offers.

Why does someone want to offer you a job?

Not just someone, a complete stranger.
They do not want to pay you any money. That much is certain.
They are more interested in what they can get from you. These emails are generally phishing attacks. They are phishing to see what they can get from you:

  • Personal details if you send them your resume they’ll generally gain a lot of useful information. This may lead to them having further communications with you and asking further questions, particularly if you have recently worked for an interesting employer.
  • Professional knowledge – assuming that you recently worked for an interesting corporate or government client, the scammers might start asking questions about your time there, in a hope that you might be clumsy enough to disclose information that may allow them to attempt attacks against that organisation.
  • Banking details – to start working they may ask you to make an initial payment for registration, or to pay for supplies, or they may ask for your bank details to be able to initiate payments. Never do this unless you have verified who they are, and that they are a legitimate employer.
  • Time – they may offer you a trial period, likely they have no intention of offering you permanent work. They just want to make the most of your efforts during the trial period, then you’ll never hear from them again. They just wanted you as a temporary digital slave.
  • A combination and as much of all the above as they can possibly get.

You have mail!

Well, I have an odd email. It appears to be from someone named “Virginia Wolf”. Wasn’t she a famous author? Even if this was the author, there is no reason for her to be contacting me. The use of this name is to trick the unwary into thinking that possibly they may know the sender, and hence open the email.


The second oddity that sticks out is that the subject of the email is my name. I like my name. A serious employer who is genuinely interested in a professional arrangement with me would make sure that they get my name right, including appropriate capitalisation.

So What is this?

As I am using a web based email service to view my emails, I know that I can go a little further in investigating these emails. If I was reading this through Outlook on my desktop, or another desktop email client such as Thunderbird, where the email and any potentially nasty payload has downloaded to my computer already, I would simply delete the email at this point. Since I am viewing the email as it is opened on a server somewhere else in the world, I feel a bit more comfortable about reading further.



Immediately I see the email address of this supposed “Virginia Wolf”. ‘torresczrsandragz’ is the first part of the email address. Lets stop and think, what serious business person is going to have an email address like that? No one. It is too hard for people to remember, too difficult to tell them quickly. This may be a real email address, but it does not belong to anyone conducting a legitimate business, unless they are brain dead. Furthermore, the domain part of the email is “@outlook.com”. This tells me that they are not emailing me from a business email account. They are using a randomly created email account, or pretending to be using an Outlook webmail account.


Perhaps the first impressions were bad, but it can only get better, right? Wrong

If you can do so safely, reading through the email a little can provide further clues.
The whole text is bogus, and poorly written. Let me pick some particularly good examples:

We are one of the top international distributors of the variety of goods
At no point is any identification of an organisation/employer made. If this was a legitimate offer, the employer would disclose their corporate identity, particularly if they were a big international company. There is also no definition in the email of a group, set or category of goods that this supposed employer markets – so “the variety of goods” is both a lie and bad grammar.

If you are sure enough to try and become a member of one of the most prospective enterprises in Australia,
If you are sure enough to what…? This sentence is very poorly worded. If they were a large international employer serious about doing business in Australia, they would pay one of their staff to get the wording correct, or at least pay for an outsourced resource to do a quality job.

Unfortunately, we are not able to invite the applicants outside Australia. Thus you have to be either a resident, or a legal permission to work for applying.
“we are not able to invite the applicants outside Australia” could mean a number of things. Might mean that there is not any international travel involved in the job. “Thus you have to be either a resident”, of Australia we assume. “or a legal permission to work for applying”, this makes zero sense in so many ways. How can a person also be a form of legal permission? And the sentence structure is defective at best.

Your tasks will involve:

- communicating with customers from the USA, Asian and European countries, assisting to build the trading process as smooth as possible for them; again, very bad grammar
- processing the information, mostly related to the sales;processing ‘the’ information… bad grammar
- assisting the sales office with different problems;

- and, last but not least, offering the articles. offering articles?

We are ready to provide a monthly rate of 8000aud per month for a job on a permanent basis. If you prefer to be more flexible, you can choose the short hours type of a job...
“type of a job” - bad grammar
, with the wage up to 4000aud per month. These figures do not involve various encouragements to be obtained for excellent results.

You must pass a test period before being employed permanently. 
This line is the clincher. What it should tell you immediately is that at best you will work your butt off for the trial period, then you will not pass the test, and they will never pay you.


Your skills should include:



Our chief demand is good access to the Internet from your PC or laptop. 
Lets read that again, “our chief demand is good access to the Internet from your PC or laptop”. This is the single most truthful statement in this email. These scammers want to gain access to and control over my computer. What for? Don’t know. But the next sentence might tell us a bit about how they would do it.

You must have certain MS Excel skills as well as the software programs installed.  
This reads as if you don’t have Microsoft Excel installed, do not apply. Most likely that this email is first stage of a campaign, the second stage is that when someone applies for the job the scammers are almost guaranteed that the applicant has Microsoft Excel on their computer, and there is the chance that the scammers could send an Excel spreadsheet, possibly a timesheet, which happens to have embedded malware.



We are waiting for receiving your reply...
bad grammar again 
and we are eager to give your career a good start in a wonderful and creative team guided by a charismatic leader.
Is this an invitation for a job or to become a member of a religious sect?



Not convinced its a scam? Check the finer details

Still think a complete stranger from a mystery organisation, who has English writing and comprehension skills less than that of your average sixth-grader, is offering you full-time employment from the comforts of home for $96,000 a year? Perhaps you should look into the technical details of the email. Let’s explore the source of the message.



Now we are looking at the finer details. Let’s get some data about who this is coming from. Looking at the source data of the email, we can see that there is an IP address of the sender.



Let’s take that IP address (40.92.12.18) and see who owns it. Using the IP Lookup tools at www.ip-address.org.



If we type in the IP address and search, it comes back with what looks to be the name of what might be a legitimate email server in Microsoft’s Outlook.com infrastructure. However this does not match the server/domain details given in the message ID of the email: BY2PR12MB0292.namprd12.prod.outlook.com .



So, lets look at this problem the other way and do a Reverse IP Lookup. Initially the full server name of "BY2PR12MB0292.namprd12.prod.outlook.com" does not resolve to an IP address. Piece by piece we strip it down - “namprd12.prod.outlook.com”, then “prod.outlook.com” - still no resolution to an IP address. Finally “outlook.com” resolves to Microsoft Azure in Des Moines, Iowa, with an IP address of 40.97.128.194 . Given that Outlook.com is a well known webmail service provider, this is an expected result.

But this is odd. Our IP Lookup and our Reverse IP Lookup results give conflicting information. Whilst there is an outside chance that it is all legitimate, there is a greater chance that these scammers have managed to successfully spoof the IP address from the Microsoft infrastructure and apply it to their own server, or worse, they have hacked the Outlook.com servers. Suffice to say, these results do not give us a warm and fuzzy safe feeling.

If my assertions regards the address spoofing are even close to being correct this is likely why the GMail spam scanners did not send this email straight to my spam folder.

What to do next?

The next thing to do is to report this scam. At a bare minimum, this should be reported to your ISP or webmail provider. This will enable your webmail/ISP provider to block such emails better in future. Gmail provide an easy way to do this.



I would however, encourage you to go further and report such emails to your relevant national cyber crime authorities. In Australia that is ScamWatch.gov.au. If you have already fallen victim to such an email, gather what evidence you can and report it to ACORN.gov.au - the Australian Cyber-crime Online Reporting Network.