Last Updated: 2015-09-28 10:52:30 UTC
by Johannes Ullrich (Version: 1)
This morning, I received several e-mails with the subject "Email from Transport of London". The attacker even picked a plausible "From" address with email@example.com. This domain is used by Transport of London for information about London's congestion charge.
The domain does have an SPF record defined, making it easy to reject the emails as spam:
v=spf1 include:spf.messagelabs.com -all
This SPF record would allow all hosts listed in Messagelab's SPF record to send e-mail on behalf of cclondon.com. Interestingly, the e-mail seems to include a fake "Received" header, listing a "cclondon.com" host as part of the received chain:
Received: from 22.214.171.124.dynamic.mundo-r.com (126.96.36.199.dynamic.mundo-r.com [188.8.131.52])
by mail.dshield.org (Postfix) with ESMTP id B11E07FE0C;
Mon, 28 Sep 2015 09:40:21 +0000 (UTC)
Received: from cclondon.com (tfldxmqmp63-svc [10.130.182.150])
by tfldcpopp21.cclondon.com (Postfix) with ESMTP id 367DFD536
Since my server (mail.dshield.org) states that it received the e-mail directly from 184.108.40.206, an apparently home user system, I doubt the second Received header is real.
These emails do not only target Londoners, but appear to also use Subject lines like:
"Toll road bill notice"
"Outstanding toll road payment notice"
The London Transport one was however the only one I saw that played the trick with a valid looking From address.
Sadly, anti-virus coverage for the obviously malicious attachment is dismal with 4 out of 55 on Virustotal (F-Secure being the only "name brand" AV recognizing it as a generic downloader). 
A quick screen shot of the entire message:
(click on the image for a full size view)