Pharmaceutical scammers are currently spamvertising a YouTube themed email campaign, attempting to socially engineer users into clicking on the links found in the legitimately looking emails.
Upon clicking on the fake YouTube personal message notification, users are redirected to a website reselling popular counterfeit drugs. The cybercriminals behind the campaign then earn revenue through an affiliate network.
Sample screenshot of the spamvertised email:
Once users click on the link found in the email, they’re redirected to the following holiday-themed pharmaceutical web site:
hxxp://canadapharmcanadian.net – 126.96.36.199
The following fraudulent pharmaceutical sites have also been known to respond to the same IP (188.8.131.52):
tabletlevitripad.com – 184.108.40.206 – Email: email@example.com ; Name servers: NS1.GENERICSWELLOCH.COM (220.127.116.11); NS2.XCILE.RU (18.104.22.168)
carewiski.com – Email: firstname.lastname@example.org
garciniaherbal.com – Email: email@example.com ; Name servers: NS1.OMECT.RU (22.214.171.124); NS2.ZORNY.RU (126.96.36.199)
benghazilispharm.com – 188.8.131.52 – Email: firstname.lastname@example.org ; Name servers: NS1.BENGHAZILISPHARM.COM (184.108.40.206); NS2.BENGHAZILISPHARM.COM (220.127.116.11)
canadawelcanadian.com – Email: email@example.com ; Name servers: NS1.CLUL.RU (18.104.22.168); NS2.TLAH.RU (22.214.171.124)
centprescription.com – 126.96.36.199 – Email: firstname.lastname@example.org ; Name servers: NS1.CENTPRESCRIPTION.COM (188.8.131.52); NS2.CENTPRESCRIPTION.COM (184.108.40.206)
bloodgenerics.com – 220.127.116.11 – Email: email@example.com ; Name servers: NS1.BLOODGENERICS.COM (18.104.22.168); NS2.BLOODGENERICS.COM (22.214.171.124)
tabletgenerics.com – 126.96.36.199 – Email: firstname.lastname@example.org ; Name servers: NS1.TABLETGENERICS.COM (188.8.131.52); NS2.TABLETGENERICS.COM (184.108.40.206)
drugenericsmeds.com – 220.127.116.11 – Email: email@example.com ; Name servers: NS1.DRUGENERICSMEDS.COM (18.104.22.168); NS2.DRUGENERICSMEDS.COM (22.214.171.124)
drugherbalpills.com – 126.96.36.199 – Email: firstname.lastname@example.org ; Name servers: NS1.OHICS.RU (188.8.131.52); NS2.SIEW.RU (184.108.40.206)
Fortunately, during the time of testing the responsiveness of the site, it was desperately trying to remain online, which prevented the socially engineered users from initiating a transaction through it. However, this is sadly an isolated incident. According to recently published research, hundreds of thousands of US-based users click on links found in these types of fraudulent emails, and actually add counterfeit drugs to their shopping carts. The vibrant cybercrime ecosystem is in fact so advanced that, in order to stimulate the affiliate network participants into converting more traffic into actual customers, they even hold annual contests aiming to build a loyal community of network participants.
This isn’t the first time that we’ve intercepted attempts by pharmaceutical scammers to socially engineer potential customers into clicking on the links found in legitimately looking emails. In the past, we’ve found fake Google Pharmacies and emails impersonating YouTube and Twitter, as well as Facebook Inc., in an attempt to add more authenticity and legitimacy to their campaigns.
We expect to see more of these campaigns in 2013, with a logical peak over the next couple of days, so watch what you click on, don’t enter your credit card details on websites found in spam emails, and never bargain with your health.