Analysis of a Mail Scam

It is actually surprising that that actually a spam/scam phishing mail actually made it past Gmail’s filter, given that I have only had a handful of spam mails making through out of the years I’ve had the account.

If that made through, I’m sure other people would have received the same thing as well, so it might be a good idea to share with others this information, lest someone gets their bank account broken into.

Besides marking out my email addresses with XXXXX, the entire body of the message remains the same:

Delivered-To: XXXXX@gmail.com
Received: from gmail-pop.l.google.com [209.85.163.109]
        by localhost with POP3 (fetchmail-6.3.4)
        for <XXXXX@localhost> (single-drop); Sat, 15 Sep 2007 13:30:05 -0700 (PDT)
Received: by 10.114.109.12 with SMTP id h12cs126573wac;
        Sat, 15 Sep 2007 13:21:15 -0700 (PDT)
Received: by 10.100.46.19 with SMTP id t19mr4664427ant.1189887674970;
        Sat, 15 Sep 2007 13:21:14 -0700 (PDT)
Return-Path: update@yahoo.com
Received: from mail.com ([76.224.245.158])
        by mx.google.com with SMTP id i10si2529292wxd.2007.09.15.13.20.55;
        Sat, 15 Sep 2007 13:21:14 -0700 (PDT)
Received-SPF: neutral (google.com: 76.224.245.158 is neither permitted nor denied by domain of update@yahoo.com) client-ip=76.224.245.158;
Authentication-Results: mx.google.com; spf=neutral (google.com: 76.224.245.158 is neither permitted nor denied by domain of update@yahoo.com)
smtp.mail=update@yahoo.com
Message-Id: <46ec3eba.0a87460a.1faa.47a0SMTPIN_ADDED@mx.google.com>
From: Bank Of America Security Team <update@yahoo.com>
Subject: *** Important Notice From Bank Of America Security Center ***
Date: Sat, 15 Sep 2007 13:21:16 -0700
MIME-Version: 1.0
Content-Type: text/plain;
        charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

 We recently have determined that different computers have logged onto your Online Banking account, and multiple password failures were present before the
logons. We now need you to re-confirm your account information to us.

If this is not completed by September 17, 2007, we will be forced to suspend your account indefinitely, as it may have been used for fraudulent purposes. We
thank you for your cooperation in this manner.


  To confirm your Online Banking records click on the following link:
  http://76.225.156.194/verify/sslencrypt218bit/online_banking/


Thank you for your patience in this matter.

Bank of America Customer Service

Please do not reply to this e-mail as this is only a notification. Mail sent to this address cannot be answered.

 2007 Bank of America Corporation. All rights reserved.

The parts highlighted in red is the ones that people should look out for. Firstly, Bank of America decided to send me a mail via Yahoo, how interesting. The second part, being that instead of linking to Bank of America’s website, an IP address is used for this purpose. That’s a giveaway that the server isn’t legitimate.

Doing a reverse DNS lookup via 'host' yields the following information:

adsl-76-225-156-194.dsl.pltn13.sbcglobal.net

Isn’t that interesting to find out that Bank of America has to rely on someone’s home ADSL connection. sbcglobal.net is one of the America’s Internet providers, so I assume this has originated from somewhere in the US.

Doing a 'traceroute' seems to confirm that it came from somewhere in the East Coast, possibly New York, and the machine is still up and running.

Well either the hacker is really dumb, or some poor guy’s machine has been compromised and became an unwitting accomplice in a phishing scam attempt. If you are one of the few who has received any warning email from Bank of America, take note, and don’t fall for it.