One persistent Phish


For the last three months I have personally received the same phishing email masquerading as a PayPal 'your account has been suspended' notification, trying to steal my login credentials:

The email arrives from "service@paypal.com" and looks very convincing for the average user. 

Here is the current phishing chain the threat actors are currently using in these types of attacks:

Fortunately, there are several steps involved in this attack. Hopefully this will give unsuspecting users more of a chance to recognise they are being targeted. Flow of the phishing chain (NB the credential harvesting page is replace with the YouTube video):

The interesting part of this attack to me, is that it leveraged one of MySpace's domains to redirect users to the next stage. However, if you try to visit one of the links - without clicking on the button in the URL - it will redirect you to the same YouTube video.

Example YouTube comment from these videos:

Interestingly, I also used URLscan.io here for to check for pages that also redirect to this odd YouTube video. Looking at how often it has been submitted this appears to be an active, ongoing campaign.


Using OSINT techniques such as checking WHOIS data of the malicious domains, we can also learn more about who is behind these attacks. From this, we learn both of the domains were registered through an Indonesian Registrar and hosted with ASNs that are notorious for allowing malicious content and slow for takedowns.

WHOIS Data:

Domain     bloodformercy.id
Age             112 days old
IPv4             192.119.80.250
Location     Washington - Seattle - Hostwinds Llc.
ASN             AS54290 HOSTWINDS, US
DNS     DNS1.REGISTRAR-SERVERS.COM, DNS2.REGISTRAR-SERVERS.COM

Domain     umbrellacorp.id
Age             136 days old
IPv4             192.64.113.199
Location     Georgia - Atlanta - Namecheap Inc.
ASN             AS22612 NAMECHEAP-NET, US
DNS     DNS1.REGISTRAR-SERVERS.COM, DNS2.REGISTRAR-SERVERS.COM

Sponsoring Registrar PANDI ID:         H8100226
Sponsoring Registrar Organization: Jagat Informasi Solusi (int)
Sponsoring Registrar City:                 Jakarta
Sponsoring Registrar State/Province: Jakarta Pusat
Sponsoring Registrar Postal Code:         10220
Sponsoring Registrar Country:                Indonesia
Sponsoring Registrar Phone                 2129388505
Sponsoring Registrar Contact Email:      info@belidomain.co.id

Conclusion: 

Although I have blocked the sender and have submitted takedown requests it appears I am doomed to continue to receive this PayPal phish 😂 

If you enjoyed this, may I invite you to check out my recent talk at BeerCon2 regarding the phishing threat landscape. It is available here and the TL;DR can be found here.

Indicators of Compromise (IOCs):

Domain: umbrellacorp[.]id

Domain: bloodformercy[.]id

Domain: acwqva[.]com

URL: hxxp://umbrellacorp[.]id/killbot/saymon.php

URL: hxxp://umbrellacorp[.]id/killbot/thomas13.php

URL: hxxp://portal[.]bloodformercy[.]id/mobile-signin

IPv4: 192.64.113.199

IPv4: 192.119.80.250

MySpace Redirector Links:

URL: hxxps://mysp.ac/4fylg
URL: hxxps://mysp.ac/4evC9

References:

Popular posts from this blog

Deep-dive: The DarkHotel APT

Turkey targeted by Cerberus and Anubis Android banking Trojan campaigns

My first year in Cyber Threat Intelligence