Crimson International Scam Email Warning – Don’t Get Infected!

E-mail scams and phishing attempts are becoming increasingly common as cybercriminals look to trick unsuspecting victims into compromising their systems or disclosing sensitive information. One such scam that has been circulating recently involves emails that pretend to be from the pharmaceutical company Crimson International.

scams

Overview of the Crimson International Email Scam

This fraudulent email claims to contain information about a pharmaceutical order from Crimson International. The email uses the company’s name and branding to appear legitimate at first glance.

The subject line of the email reads “Pharmaceutical order from crimson international.” The body contains a short message claiming they have a revised order and are requesting a price quote and certificate of analysis (COA).

However, upon closer inspection it becomes clear this is not a real communication from Crimson International. The email contains several red flags that indicate it is malicious spam or phishing attempt.

Some of the signs this email is a scam include:

  • Generic greeting without using the recipient’s name
  • Poor grammar and spelling errors
  • Requests sensitive information like pricing and certificates
  • Attachment with a potentially malicious file

The attachment that is sent with the email often contains malware or a remote access Trojan (RAT) that can infect the victim’s computer if opened. The specific malware being distributed is believed to be the Agent Tesla RAT.

This allows the attackers to gain full access to an infected system, allowing them to steal data, install more malware, or utilize the victim’s computer for their own criminal purposes.

It is important to note that this malicious email is not associated with the real Crimson International pharmaceutical company in any way. The scammers are simply impersonating the company in order to trick people.

Criminal Motives Behind the Scam

Cybercriminals orchestrate email scams like this Crimson International phishing attempt for a few key reasons:

  • Financial fraud – Getting access to business systems can allow scammers to conduct invoice or payment fraud, redirect transactions, or steal banking credentials.
  • Malware distribution – Sending malware like Agent Tesla through phishing emails allows it to bypass many email security filters and infect more victims.
  • Corporate data theft – Once inside an organization’s network, the attackers can exfiltrate sensitive data like customer info, trade secrets, intellectual property, and more. This data can sometimes be sold to competitors or other criminal groups.
  • Use of infected computers – Computers infected with the RAT can be added to a botnet, which are networks of devices under the control of cybercriminals. Botnets can be leveraged for sending more spam, distributed denial of service attacks (DDoS), cryptocurrency mining, and other illicit money making schemes.

As you can see, the operators behind phishing scams like this one can benefit in numerous ways if victims are tricked into opening the malicious emails and attachments. This results in very real financial and data security consequences.

How the Crimson International Scam Works

Now that we have covered an overview of the scam, let’s look closer at how the phishing attempt works and tricks users into compromising their systems:

1. Scammers Send Mass Emails Impersonating a Company

The cybercriminals begin by crafting emails that masquerade as a legitimate business communication. In this case, they pose as Crimson International, a real pharmaceutical company, in order to appear trustworthy to recipients.

The email is made to look like it is coming from an employee or representative of Crimson International requesting a revised price quote and certificate of analysis for an order.

Of course, the contact information in the headers will actually point back to the scammer’s servers, not Crimson International’s real email addresses. But this is designed to fool casual glance.

2. Recipient Opens Email Thinking it is Legitimate

When victims first see the email in their inbox, they are likely to open it without initially realizing it is malicious.

The phishing email has no obvious red flags at first glance. The average person is not analyzing header information or scrutinizing every email they receive claiming to be from a legitimate company.

Seeing Crimson International in the subject line and content, many will open the email thinking it is a normal business communication.

3. Malware Attachment Infects Victim’s Computer

Once opened, the email instructs the recipient to review the attached document which supposedly contains details about the pharmaceutical order being discussed.

However, this attached document in actuality contains malware – specifically the Agent Tesla remote access Trojan. Agent Tesla is the payload the cybercriminals are distributing through this phishing scam.

If the victim clicks and opens the attachment, the Agent Tesla malware will automatically execute and install itself on their system without the need for any action. The malware infection will then provide full remote control of the system to the attackers.

4. Criminals Use Illicit Access Against the Victim

From this point on, the possibilities are frightening for what the criminals can do after compromising the victim’s computer.

Having installed the RAT malware, the attackers now have:

  • Remote desktop control to manipulate the infected system at will
  • Tools to start exfiltrating any data stored on the system
  • Ability to download additional malware payloads
  • Capacity to monitor users’ activities through keylogging and other surveillance tools
  • An infected endpoint they can leverage as part of a botnet

The victim’s antivirus software and firewalls are rendered useless since the malware is already installed and often uses evasion techniques to avoid detection.

The hackers can then steal passwords, transfer funds, or collect sensitive corporate data at their leisure. Or they may opt to just sell access to other criminal groups on dark web markets who will in turn abuse the compromised system.

Either way, the consequences can be severe once the malicious attachment from the phishing email is opened. This gives the scammers backdoor access into both personal and enterprise networks.

Optimizing Defenses Against the Crimson International Scam

Now that you understand how this scam works and the criminal motivations behind it, it’s crucial to know how to optimize defenses to avoid falling victim. Here are some best practices individuals and organizations should follow:

Carefully Inspect Unexpected Emails Claiming to be From Companies

The foundation of phishing defense is training email users to scrutinize any unexpected messages purporting to be from a legitimate business.

Look for typos, grammar mistakes, generic greetings, and requests for sensitive information or action – these are common red flags. Also verify the sender’s email address looks accurate if unsure.

Even emails mentioning your company’s name specifically in the subject or content could be spoofed. Approach with caution.

Avoid Opening Attachments From Unknown Senders

Users should develop a mindset of always distrusting attachments in emails, especially from unfamiliar contacts. This simple habit could prevent infection in many phishing incidents.

When attachments must be opened, you can try to preview the file type icon first instead of enabling macros or plugins. Be on high alert for anything suspicious.

Install and Update Antivirus and Anti-Malware Tools

Security software with real-time protection and scanning can potentially detect known threats in emails and attachments before they reach users’ inboxes.

Make sure all antivirus and anti-malware programs are patched with the latest definitions to identify new phishing techniques and malware strains as they emerge.

Use Email Filtering Tools To Identify Phishing Attempts

Dedicated email security solutions can automatically detect potential phishing emails using a combination of tactics like header analysis, content inspection, machine learning, and blacklist databases.

Tools like DMARC, DKIM, and SPF can also help validate legitimate emails and block spoofs. This acts as an additional filtering layer against phishing.

Limit Public Email Posting and Sharing

Be careful about posting generic company email addresses publicly online or sharing them outside trusted recipients. This makes it easier for scammers to harvest valid business emails and use them as phishing targets.

Educate Employees on Phishing Threats

Ongoing user education is critical to help staff recognize subtle phishing indicators that automated systems may miss. Teach employees how to scrutinize emails and safely handle attachments to create a human firewall.

Combining the above technology solutions and user training best practices will help significantly improve resilience against phishing campaigns like the fake Crimson International emails. Staying vigilant and keeping systems patched and secured is key to protecting against evolving cybercriminal tactics.

What to do if You Have Fallen Victim to This Scam

If you believe you have been compromised by opening the attachment in the Crimson International phishing email, here are the steps you should take right away:

1. Disconnect Your Device From Networks Immediately

If your system has been infected with malware like Agent Tesla, one of the worst things you can do is continue having that system connected to business networks or the internet. This allows the attackers to leverage and abuse your device remotely.

Unplug the system from wired connections, disable Wi-Fi, and generally air gap the device as much as possible to cut off criminal access. This limits the damage that can be done.

2. Reset Passwords for All Systems and Accounts

With your device compromised, assume that any passwords, credentials, or other sensitive data stored on that system is potentially accessed by the attackers.

Work under the assumption your passwords are burned. Change the credentials on the infected system, email accounts, financial accounts, cloud services, or any other login that could be utilized by criminals who now have a backdoor into your device. Enable multi-factor authentication where possible.

3. Scan for More Compromised Devices on Your Network

There is a strong chance that your network has been more broadly compromised if you opened a phishing email attachment. Isolate and scan all your systems to check for additional malware infections that may have spread.

Look for signs of data exfiltration, unexpected encrypted files, unknown processes and services, suspicious network connections, or other IOCs that point to a wider breach. Take measures to detect lateral movement.

4. Wipe and Re-Image Infected Systems

For endpoints confirmed to be infected with malware, the only way to fully remediate is often to wipe the system completely and re-image it from a known good backup or source image file.

Simply running antivirus scans or deleting individual files is often not enough, as sophisticated malware can embed itself at a system level. Full wipes reduce the risk of reinfection from remnants.

5. Reset Compromised Credentials a Second Time

Once you have wiped infected systems and restored them to a clean state, you must now reset all credentials again. This ensures any credentials that may have been harvested during the breach are cycled out and invalidated. Enable multi-factor authentication wherever possible.

6. Notify Contacts of Potential Data Compromise

If sensitive customer data, intellectual property, financial information, or other private records were potentially accessed in the breach, you may have regulatory and compliance obligations to notify impacted individuals and partners. Follow breach disclosure laws and consult experts as needed on notification requirements.

7. Engage Incident Response and Forensics Firms

For more severe enterprise compromises, it is often wise to enlist outside cybersecurity incident response teams and digital forensics firms to fully identify root causes, quantify potential data loss, and implement recovery processes. They can also help address legal and regulatory duties in large-scale breaches.

Recovering from a malware infection requires time and dedication. But following these steps can help minimize damage, restore systems, reset credentials, identify areas of persistence, and prevent future failings of a similar nature. Don’t delay in taking swift action at the first sign of compromise.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Here is an FAQ section about the Crimson International email scam:

Frequently Asked Questions

What is the Crimson International email scam?

This is a phishing scam where targeted emails are sent out pretending to come from the pharmaceutical company Crimson International. The emails discuss a fake revised order and contain infected attachments that install malware if opened.

What is the goal of this scam?

The cybercriminals aim to infect victims with remote access malware like Agent Tesla to steal data, install more malware, spy on users, or utilize compromised systems in other illegal cybercrime operations.

How does the scam email reach people’s inboxes?

The scammers use spoofed email headers and branding to pretend the message is from Crimson International. This tricks some email filters and users into believing the email is legitimate.

What should I do if I receive an email like this?

Do not open any attachments. Double check the sender address for accuracy if you are unsure. Report the email as phishing/spam. Delete the message and do not reply.

Can anti-virus or email security tools detect this scam?

In some cases yes, but cybercriminals constantly evolve their tactics to bypass filters. Users should still scrutinize emails in addition to security software.

What happens if a user opens the attachment?

The malware payload in the attachment infects their system. This allows remote access for criminals to steal data, install more malware, spy on users, or utilize the compromised computer for other illicit activities.

How can users recover if they opened the attachment?

Immediately disconnect the infected device from other networks. Reset ALL passwords. Wipe and re-image the compromised system. Scan other devices for infection. Notify contacts if sensitive data was exposed. Engage incident response teams as needed.

How can companies better protect against this scam?

Implement email filtering tools, keep antivirus software updated, provide effective phishing training to employees, avoid posting generic business emails publicly, and utilize multi-factor authentication.

Who should be notified about this scam?

Report the phishing attempt to your security team. Law enforcement agencies like the FBI that track cybercrime can also be notified to help prevent further spread of the scam.

Conclusion

Phishing emails impersonating legitimate companies continue to be a threat, as seen in the recent scam pretending to be Crimson International. The scam takes advantage of brand familiarity and Holder
our lack of scrutiny when receiving emails that appear to be from major corporations.

However, learning the common signs these phishing attempts exhibit allows us to be more discerning and identify the red flags. Avoiding opening attachments from unknown senders can also prevent infection.

Enterprises must couple these user education efforts with technological defenses like gateway email filtering, antivirus, and access controls to create defense in depth.

With proper layered security and vigilance, organizations can significantly reduce their risk of falling victim to phishing campaigns like this Crimson International scam email distributing Agent Tesla malware. But it requires active appraisal of inbound emails, patching systems, and enabling multi-factor authentication across the environment.

By understanding the scam tactics, strengthening email security posture, and training staff to identify subtle phishing indicators, companies can better defend their networks and data against unauthorized access attempts.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.