When a threat actor wants to create a phishing page they will create the page on their own machine.
Zipping it up 🤐
And then putting this zip on a website to then deploy 🌐
🥷Building threat actors create these kits and sell them to other threat actors 💰
Deploying / Controlling threat actors put the kits online and then extract the content to instantly upload a working phishing site 🦹
🗄️Why do we collect kits?
Phishing kits contain very valuable information such as PHP code, configuration settings and all the phishing sites resources. 👀
We are then able to link, cluster, and attribute these phishing sites back to actors and individuals. 🔄
🔍What should you look for in a phishing kit?
This is a deep dive into phishing kits and items of interest which have been seen in phishing kits...
✅ Configuration Files
These files are interesting as it shows us how the website is configured and what settings are available to the controlling actor.
Config pages are often written in PHP but can also be in JSON or another text format. 🔠
Common options available are exfil email, file write, geo blocks, user agent blocks etc. 📨
✉️Email Exfiltration Script
This is the piece of code used to send the stolen data back to the actor. ➡️
We can often find unique strings and actor fingerprints in these items as well as understanding at a quick glance what data is stolen from a victim 📤
🤖Antibot files
These are crude attempts by builders to block unwanted visitor is such as researchers and bots.🚫
💻Methods used are often IP ranges, Useragents, and proxy checkers.
It is frequent to see these antibot files being used across multiple kits as builders just steal and use other actors IP lists in a hope to remain undetected for as long as possible. 🕵️
✴️Admin Panels
I have already written an extensive (now outdated) thread on attributing admin panels.
Within phishing kits we find source code to the admin panel.
This allows us to understand how the panel works, authentication configurations, and any weaknesses in the code. 🦾
📳 2FA bypass
We are seeing more websites and users now using two factor authentication for their accounts and as a result phishing kits are now targeting these codes. 📱
Within phishing kits we get to see how these 2FA stealing methods work. #⃣
Often they are basic with no automation, whilst other kits will automate the login of an account triggering a 2FA code to be sent via SMS to the victim.
👁️How do you find kits?
Threat actors need to use kits to upload their sites. 🕸️
There are a number of ways in which you can grab them from them. 📍
If a threat actor leaves a kit in an open directory.😅
🏁 This can occur if they forget to remove it or you can capture it before they remove it then you can download the kit with ease.
You can try guessing where the kit might be stored and this can be done by simply appending .zip to the end of the URL. 🍡
Although you can't see the file structure behind the website the actor have extracted the kit and kept the directory names the same.
What next? 🤓
If you now have a kit look into it:
Read the code 🔍
Understand how it works ❓
Share this research online so we can all see what is happening 🌐
Threat Actors using the global CrowdStrike outage to spin up new domains 🌐
👁️Keep an eye out for malware posing to 'fix' the issue
🔒Malicious phishing pages posing as a fixing site
#Phishing
IoCs for people to monitor:
/crowdstrikebluescreen.com
/crowdstrike0day.com
/crowdstrike-bsod.com
/crowdstrikedoomsday.com
/crowdstrikedoomsday.com
/crowdstrikefix.com
/crowdstrikedown.site
/crowdstriketoken.com
One site is a IT repair shop offering their services to help impacted companies.
⚠️UK police to send 70,000 SMS after taking down ispoof
The UK’s largest fraud operation has brought down a phone number spoofing and OTP capturing site - ispoof[.]cc📱
Full Details and Analysis in Thread⤵️🧵
🕵️UK law enforcement are now preparing to send 70,000 SMS messages to potential victims of the site
ispoof allowed controlling users to intercept OTP and Telepins of victims #⃣#⃣#⃣#⃣
💯This video was uploaded to the ispoof telegram channel and is beyond amazing!!! 😂🤣😂🤣
🔗Alleged site administrator Teejay Fletcher, 35, has been arrested and charged with making or supplying articles for use in fraud and for participating in the activities of an organised crime group
📸Here is the 'original' marketing video ispoof created...
There is a total of 433 victims data analyzed in the research; however, not all fields were submitted or valid so total data ranges will vary throughout.
Chart 1 - Age of impacted victims 🎂
The year of birth for the victims with the most impacted being aged between 21-30yrs old. Notably it is not just elderly people who get impacted by phishing which is often assumed.
The second most impacted are victims aged 31-40yrs old.