Security researchers for ISC (Internet Security Center) have uncovered a new phishing campaign that uses a login form on top of a blurred image of an Office document to trick users into handing over their login details.

This particular phishing campaign is distributed via spam email messages that also contain a blurred out image, with a link to view the file at the end of the email message.

The link leads back to a Brazilian server, which didn’t appear to be hacked, like most phishing hosts regularly are.

Phishing page login form was very vague

All phishing campaigns have a weakness, and according to ISC researcher Xavier Mertens, this one had several.

For starters, the phishing campaign isn’t very well-defined. Mertens says that crooks weren’t very specific when they crafted the login forms, and victims landing on this page wouldn’t have known what login details they should fill in.

“The strange fact is that it is not clear which credentials are targeted: Google, Microsoft or corporate accounts?” Mertens explains. “The success of an efficient phishing is to take the victim by the hand and ‘force’ him/her to disclose what we are expecting.”

Crooks forget phishing kit source code on the server

The researcher also says that the crooks misconfigured the server hosting this phishing campaign, which allowed him to access all its files, including PHP resources. On the server, Mertens says he discovered the kit with which the crooks crafted their phishing campaign.

Crooks created the blur effect by taking a low-res image (ex: 300*200px) and displaying it at very high resolutions. On top of these, they displayed a login form which featured JS-based validation of the email address the user entered.

The crooks would check to see if the user would have entered a valid email address, and showed errors in case the user tried to test the phishing page by entering non-standard data.

Phished data was sent via email to the crooks

Once the JS scripted detected a valid email address, it would send the following details via email to the attacker’s email address: email, password, GeoIP details, user-agent string, FQDN computer ID, and the victim’s IP address.

The phishing campaign had a second page, one that asked the user to enter his phone number. As with the first step, this detail, if filled in, was sent via email to the crooks.

Mertens says the crooks behind this campaign used two email addresses hosted on Gmail and to receive their phished credentials.

The lesson here is that if you look long enough at any phishing page, it’s quite easily to find easily detectable flaws, either in the GUI or the page’s source code.

Phishing page used in the recent campaign

Phishing page used in the recent campaign

Let’s block ads! (Why?)

Related Posts

Facebook Comments

Return to Top ▲Return to Top ▲