News Stay informed about the latest enterprise technology news and product updates.

Dangerous IBM marketing emails make me WannaCry

Misspellings, suspicious hyperlinks, abnormal sender address, no attempt at personalisation. The classic signs of a phishing email? Or a botched marketing email from IBM promoting — wait for it — a cyber security webinar?

Updated 24 May 2017 with comment from IBM press office.

One week ago, the WannaCry ransomware outbreak made headline news, with organisations around the world infected by the virulent file-scrambling malware.

While little is known about its origins, we do know that it relies on a leaked NSA exploit in Microsoft’s SMB protocol in order to propagate between outdated and unpatched Windows PCs. Indeed, the hunt continues for a ‘patient zero’, the first machine infected by the malware that might yield clues to its provenance and how it took hold.

Now, we all recognise that one of the most common ways for malware to enter an organisation is by email, either as an attachment or a link to a website hosting malicious code. Hackers will often compose phishing campaigns off the back of high-profile news stories, capitalising on public awareness and fear.

Only yesterday, ActionFraud — the National Fraud & Cyber Crime Reporting Centre — released an advisory on fake emails purporting to be from BT that have been jumping on the coat-tails of the WannaCry attack.

Cybersecurity experts will tell us that the spelling mistakes, suspect sender address, generic introductions and hyperlinks to a dodgy-looking domain are all key tells that this supposed BT email is in-fact an attempt to ensnare less-savvy citizens.

bt-phishing-email

A phishing email purporting to be from BT.

So, surely a genuine marketing mailshot from a respected IT security solutions vendor would go to lengths to ensure it didn’t exhibit exactly the same failings as a fraudulent phishing email? Particularly if it were part of a vendor’s campaign advising on how to stay safe following a major malware outbreak?

Hello Irony

Our inbox has been creaking at the seams since the WannaCry outbreak as cybersecurity vendors and experts jostle for position to add their insight. Among the usual analyst quotes and researcher comments appeared this email purporting to be from IBM.

Let’s go through our phishing email bingo card once again:

ibm-phishing-email

Marketing mail purporting to be from IBM.

  • Poor spelling – ‘ransomeware’, anyone?
  • Suspect sender address – not sent from an ibm.com email address
  • Generic introduction – no name to reassure the sender knows any more than my email address
  • Hyperlinks to a domain that doesn’t match the sender – none of the links goes to an ibm.com URL; even the social media connections get directed to an domain that certainly doesn’t suggest IBM

That’s a full-house. In fact, there’s really very little here to convince me this email is anything but a phishing attempt.

So, how certain are we that this email is genuine? Well, aside from the fact that its social media channels were also advertising the webinar, the domain to which the hyperlinks direct – unicaondemand.com – is in fact owned by IBM. However, we only discovered this by resorting to a whois lookup – visiting the domain in a browser bounced back a 504 error. None of this is conclusive, of course.

Marketing Email Manifesto

Now, without wishing to lay too hard into IBM, it is far from alone here. While the irony is sharp in this particular case, it’s our experience that countless other firms compose their marketing materials with little care about the reader’s safety. Email is insecure, but there are things marketeers can do to make it less so.

Inspect-a-Gadget would like to see:

  • Clean links: use hyperlinks that direct to the domain of the sender or an obvious target (eg twitter.com) and not to some obscure click-tracking middle-man. Readers’ safety is more important that your analytics. If you must track, track from within your domain
  • Simple URLs: Provide a simple URL within that domain that readers can visit for themselves without clicking through (eg www.example.com/security/16-may-webinar)
  • Personalisation: use our actual names to prove you’ve not blindly copied our email from a hit list.
  • Spell checking: seriously

Without these as a minimum, companies are doing themselves no favours and ultimately putting recipients at risk.  I’m sure there are other tips companies should adopt too, and we’d love to hear them below.

We reached out to IBM for some insight, including its original email for reference. Three times. The first time, the email to security@ibm.com (as directed in the mailshot) bounced reporting an unknown user. A follow-up to the UK comms team followed, followed by another follow-up. Silence so far.

Perhaps IBM’s anti-spam filters are blocking its own phishy-looking emails…

Update: IBM’s press office responded with the following:

We are aware of this particular email which was sent to people registered to receive information from IBM. Thousands of participants ultimately attended the webinar on a very timely subject. We are exploring ways to assure future IBM emails are even easier to verify by adding a clear sender. We recommend those registered to receive emails from IBM add the email address used to send IBM marketing materials to their address book.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

In reading this study, keep in mind that the data come from surveys, and are subject to the inaccuracies common with self-reports. Storage is a great place to start, not only for the reasons the article explains, but also for its business status: for nearly all of us, storage is only a commodity, one where technology can add little incremental value. We want bytes to persist, and to be able to reach them with predictable latency. Not only is that formula simple enough, but the costs for storage have been a glaring budget item for decades, and dealing with vendors has been relatively complex throughout that time. While I’m less sanguine than some of the respondents about price advantages the cloud provides, migration of a reductive resource in use by every IT department is a natural. This applies whatever combination of public and private cloud a particular organization chooses. http://bit.ly/TaWFLA
Cancel

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close