North Bay Web
Web Design, Development & Technical Support

View Archive The North Bay Web Blog

Category - General
Posted - 10/01/2020 03:46pm
0 Comments | Add Comment
New Quick Books Intuit Phishing Scam, BEWARE!
So far today I have received 4 of these, all for different amounts, that alone should clue me in that something is wrong, but let's take a closer look anyway. Maybe I bought a bunch of things in my sleep.
I have to say, at first glance, these look a lot like the invoices that Quickbooks generates, so how do I know it's fake.
The first thing that I notice is that it's coming from an email address simply titled "Invoice", that seems strange to me. If I right click on the address it reveals an address that looks like it could be coming from quickbooks, but it still doesn't look quite right as the invoice is coming from
Looking at that email address I have to wonder why Intuit would have needed to use a subdomain ( when would have made more sense, but hey, is that enough to convince me it's fake? Maybe not.

So let's look at some other things. No misspelled words and Logo looks real, but that's easy to snag and copy. 
If I look at the "Print or save" button, I see it's not right, why is Print capitalized and save is not, they are alternate options not a sentence, so whoever or whatever wrote it, did so grammatically, not graphically. This is simply not consistent with a company as large and corporate as Intuit. They don't make mistakes, not like that, if they did, you wouldn't trust them.


Right clicking on the button reveals the contextual drop down menu where I can Copy the Link.


and pasting it into my Text editor reveals the link, which certainly doesn't look like Intuit to me.

Who knows, maybe the US changed the Trade rules and Intuit can have offices in China now, but just to be safe, let's look at the message headers.


In the first part of the header we see all kinds of things that should alert us:

query to URIBL was blocked.  See for more information. [URIs:] 0.8 BAYES_50               BODY: Bayes spam probability is 40 to 60% [score: 0.4999] 0.0 HTML_MESSAGE           BODY: HTML included in message 0.5 KAM_NUMSUBJECT         Subject ends in numbers excluding current years 1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any anti-forgery methods 2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS 0.0 T_REMOTE_IMAGE         Message contains an external image

X-Spam-Bar: ++++

Return-Path: <>

Return-Path: <>

  • The URIBL (black list) query was blocked
  • The probable spam score is 40 - 60%
  • It's coming from KAM_LAZY_DOMAIN_SECURITY, which certainly isn't Intuit.
  • The sending domain has no anti-forgery-methods
  • There is no Return DNS information from the server

Add a Comment

Category - General
Posted - 10/01/2020 02:23pm
0 Comments | Add Comment
New Apple ID Password Phishing Scam, Beware!
This is a new scam that just showed up in our box this morning, an email that appears to come from Apple requesting us to reset my password for my Apple ID, and I admit, it looks pretty genuine, but a few easy checks tells me this is a scam.


A quick Right Click on the Sender's Email address shows something that seems suspect, i.e., Apple sending support mail through a sub domain ( Could happen, but not usually their approach, so let's look at something else.

If I look down into the body of the email I see a link to "Unblock Account". Again, maybe it's legit, but not what Apple usually does. First Clue, they wouldn't send you a link to "Unblock Account". Password Reset link maybe, but "unblock" no. Still, if you're new to Apple, you wouldn't know that, so let's look a little farther and just see where that link they want me to click goes.


Right clicking on the link reveals a contextual menu where you can select Copy Link. A quick copy and paste into my text editor reveals something new.

Ok, by this point I know it's a scam as the referral link obviously has nothing to do with Apple, but if I was still uncertain, there are other clues this didn't come from a multi-billion dollar enterprise.

For instance
in the copy, the word Unauthorized is misspelled
They also say, from your Apple ID Account Page
Well, if you have an Apple ID, you know there is nothing Apple refers to as your Apple ID Account Page, but again, you wouldn't know this necessarily.

Another subtle clue is the visible link itself, https://apple 1) it just doesn't look right, it uses apple twice and there's a space between apple and id. Ask yourself, Would Apple do that? No, if anything the prompt would be a Reset Password graphic or perhaps text link, but it wouldn't be an ugly, redundant visually broken link, no, never.
Right clicking on that link to bring up the contextual menu and copying and pasting the link in my text editor reveals, surprise, the same bogus link as before.

Still not convinced, dig a little deeper

If I look at the message headers I'll see more information about where this email came from. In Apple Mail I can select View > Message > All Headers. This will display the full "header" (think of it as a path) of the currently selected email.


Viewing that header looks like this and contains all the information about the "path" of this email. Where it came from, what servers it went through, etc. 


Looking through that header I see signs that things are off. Nothing looks quite right actually. Tests that would easily pass on Apple's servers fail below. For example,  something called a URIBL query was blocked by the outbound server, why? When the servers "talk" to each other to establish and test the connection, the HELO test fails as does the request for the DKIM record, and lastly, the sender does not match the SPF record. Even without knowing what any of these things are, you should be suspect that these types of errors wouldn't be coming from Apple's servers.

ADMINISTRATOR NOTICE: The query to URIBL was blocked.  See for more information. [URIs:] 0.0 T_SPF_HELO_TEMPERROR   SPF: test of HELO record failed (temperror) 1.8 DKIM_ADSP_DISCARD      No valid author signature, domain signs all mail and suggests discarding the rest 1.5 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)

If you look a little farther in the Header you'll see something else that should make you feel confident this email didn't come from Apple, but actually from China.

Received: from by with LMTP id +PBhFM0Vdl/RDQAAKNehTQ (envelope-from <>) for <>; Thu, 01 Oct 2020 12:45:49 -0500

Received: from ([]:35319) by with esmtps  (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from <>) id 1kO2e6-0000ye-8g for; Thu, 01 Oct 2020 12:45:49 -0500

And if you dare, copy the link in the header and paste it into your browser

If you did, I'm sure you found that it did not have any relationship to Apple

Add a Comment