PostNL phishing kit (with video tutorial)

I recently came across this kit that targets PostNL customers.

The kit is currently still online.

Technically it’s not that great, the usual crap written badly in PHP; what I found funny was the “license”.


ะŸะพะปัŒะทะพะฒะฐั‚ะตะปัŒัะบะพะต ัะพะณะปะฐัˆะตะฝะธะต:

  • ะ‘ะปะพะบะธั€ะพะฒะบะฐ ะฝะฐ ะฒัะต RU ะผะฐัˆะธะฝั‹ (RU header).
  • ะŸั€ะพะดัƒะบั‚ ะฟะพัั‚ะฐะฒะปัะตั‚ัั “ะบะฐะบ ะตัั‚ัŒ”, ั„ัƒะฝะบั†ะธะพะฝะฐะป ะฒ ะพะฟะธัะฐะฝะธะธ ะบ ะฟั€ะพะดัƒะบั‚ัƒ.
  • ะะฒั‚ะพั€ ะฝะต ะฝะตัะตั‚ ะพั‚ะฒะตั‚ัั‚ะฒะตะฝะฝะพัั‚ะธ ะทะฐ ะฒะฐัˆะธ ะทะฐะบะพะฝะฝั‹ะต/ะฟั€ะพั‚ะธะฒะพะทะฐะบะพะฝะฝั‹ะต ะดะตะนัั‚ะฒะธั, ะฒ ั€ะตะทัƒะปัŒั‚ะฐั‚ะต ะบะพั‚ะพั€ั‹ั… ะฑั‹ะป ะฟั€ะธั‡ะตะฝะตะฝ ะฒั€ะตะด ะบะฐะบะพะผัƒ-ะปะธะฑะพ ะปะธั†ัƒ.
  • ะŸั€ะพะดัƒะบั‚ ะฝะตัะตั‚ ะฒ ัะตะฑะต ะธัะบะปัŽั‡ะธั‚ะตะปัŒะฝะพ ะพะทะฝะฐะบะพะผะธั‚ะตะปัŒะฝั‹ะน ั…ะฐั€ะฐะบั‚ะตั€ ะธ ะฟั€ะตะดะฝะฐะทะฝะฐั‡ะฐะตั‚ัั ะดะปั ะธะทัƒั‡ะตะฝะธั ะธ ั‚ะตัั‚ะธั€ะพะฒะฐะฝะธั ัะพะฑัั‚ะฒะตะฝะฝะพะน ะทะฐั‰ะธั‚ั‹.
  • ะŸะพะบัƒะฟะฐั‚ะตะปัŒ ะพะฑัะทัƒะตั‚ัั ะฝะต ะธัะฟะพะปัŒะทะพะฒะฐั‚ัŒ ะฟั€ะพะดัƒะบั‚ ะฝะฐ RU ะผะฐัˆะธะฝะฐั….
  • ะŸะพะบัƒะฟะฐั‚ะตะปัŒ ะฟั€ะธะพะฑั€ะตั‚ะฐะตั‚ ะฟั€ะพะดัƒะบั‚ ะปะธั‡ะฝะพ, ะฟะพะดะดะตั€ะถะบะฐ ะพะบะฐะทั‹ะฒะฐะตั‚ัั ั‚ะพะปัŒะบะพ ะบะพะฝั‚ะฐะบั‚ัƒ ั ะบะพั‚ะพั€ะพะณะพ ะฑั‹ะปะฐ ะพะฟะปะฐั‚ะฐ.
  • ะ—ะฐะฟั€ะตั‰ะตะฝะพ ะฒั‹ะบะปะฐะดั‹ะฒะฐั‚ัŒ ะฒ ะฟัƒะฑะปะธั‡ะฝั‹ะน ะดะพัั‚ัƒะฟ ั„ะฐะนะปั‹ ะฟั€ะพะดัƒะบั‚ะฐ ะธ ะฐะดะผะธะฝะบะธ, ัั‚ะพ ะฟะพะฒะปะตั‡ะตั‚ ะฑะปะพะบะธั€ะพะฒะบัƒ ะปะธั†ะตะฝะทะธะธ ะฒะปะฐะดะตะปัŒั†ะฐ.

User Agreement:

  • Block on all RU of the machine (RU header).
  • Product is delivered “as is,” the functionality in the product description.
  • Author is not responsible for your lawful/unlawful actions resulting in harm to any person.
  • Product is exclusively exploratory in nature and is intended to study and test its own protection.
  • Buyer undertakes not to use the product on RU machines.
  • Buyer purchases the product in person, which is supported only by the contact from whom the payment was made.
  • It is forbidden to upload product and admin files to public access, this will lead to the blocking of the owner’s license.

The video explaining how to install it is also very useful.

Whois info below

Domain Name: HELPDESK-TEST.ONLINE
Registry Domain ID: D479803092-CNIC
Registrar WHOIS Server: whois.namecheap.com
Registrar URL: https://namecheap.com
Updated Date: 2024-08-20T07:52:01.0Z
Creation Date: 2024-08-20T07:51:58.0Z
Registry Expiry Date: 2025-08-20T23:59:59.0Z
Registrar: Namecheap
Registrar IANA ID: 1068
Domain Status: serverTransferProhibited https://icann.org/epp#serverTransferProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: addPeriod https://icann.org/epp#addPeriod
Registrant Organization: Privacy service provided by Withheld for Privacy ehf
Registrant State/Province: Capital Region
Registrant Country: IS
Registrant Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Admin Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Tech Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Name Server: DNS1.NAMECHEAPHOSTING.COM
Name Server: DNS2.NAMECHEAPHOSTING.COM
DNSSEC: unsigned
Billing Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Registrar Abuse Contact Email: abuse@namecheap.com
Registrar Abuse Contact Phone: +1.9854014545
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of WHOIS database: 2024-08-21T10:14:38.0Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

>>> IMPORTANT INFORMATION ABOUT THE DEPLOYMENT OF RDAP: please visit
https://www.centralnicregistry.com/support/rdap <<<

The Whois and RDAP services are provided by CentralNic, and contain
information pertaining to Internet domain names registered by our
our customers. By using this service you are agreeing (1) not to use any
information presented here for any purpose other than determining
ownership of domain names, (2) not to store or reproduce this data in
any way, (3) not to use any high-volume, automated, electronic processes
to obtain data from this service. Abuse of this service is monitored and
actions in contravention of these terms will result in being permanently
blacklisted. All data is (c) CentralNic Ltd (https://www.centralnicregistry.com)

Access to the Whois and RDAP services is rate limited. For more
information, visit https://registrar-console.centralnicregistry.com/pub/whois_guidance.

The domain was registered a few hours ago at Namecheap and in the tutorial we use Namecheap as the hosting platform for the content.

Tale of a scam

This morning I dedicated half an hour to understand something better about a scam that I had understood to be a scam without ever having seen it in action.

I’ll start with a shortened link I received. A page opens with the graphics of a well-known Italian newspaper (La Repubblica) presenting a series of articles and testimonials on a way to get rich without doing shit.
hxxp://larepubblica[.]vipcanberich[.]top/bx4ng7rcoxggna6/d4wgksheywr/rwrcvjbk/
The page, even if poorly made, could be plausible for someone who is not very smart (there are people who believe in the flat earth…)

All the links on the page lead to a form to be filled out with name, surname, email, telephone number.

I fill out the form and after submitting it I find myself on a page that looks like an online trading dashboard.

The page contains the data I sent. Within a few seconds I receive a call from the number +390645220040, on the other end a young man who says his name is Fabrizio. From the way he speaks you can tell that he is not a native Italian speaker.

He introduces himself, chats and asks me to visit the site hxxps://weonmarket[.]com.

I do it and I find myself back on the previous dashboard. He asks me to visit some pages of this site trying to instill confidence in the system and asks me to send a message in a chat. I do it and after a few seconds I receive the link (hxxps://furyquick[.]io/pjprpZ) to make the first deposit of 250 euros.

I click on the link and I find myself on a checkout page of a Bulgarian site that sells training courses. I make an excuse and end the call (I told him I only have an AMEX card which I saw was not accepted by the platform).

I just receive also an email with information about my pending payment

All very simple.

So, now, what do we know?

  • Do not click on links received via email, text message or WhatsApp. It doesn’t matter if we think we know the sender.
  • Information has value based on its source. The source must be verified. If you are unable to verify a source or don’t feel like doing so you will probably mess up. Especially if you go to vote.
  • The phone number +390645220040 is used to scam.
  • The website weonmarket[.]com is used for scamming.
  • The intensibio[.]com website is used as a platform to receive money from the scams carried out by these gentlemen.
  • The furyquick.io site is used to create links to the intensibio[.]com site
  • The scam only works if you don’t want to use an American Express card. AMEX is not an accepted payment method.

Finally online!

After months of development and testing, a new, futuristic and indispensable feature has finally gone online! I put a page online to get your public IP ๐Ÿ™‚

I know there are millions of them, but all those who know returned the information I needed (my IP) along with a hundred other useless things. This page instead only returns the IP and therefore I can use it from the command line and in scripts ๐Ÿ™‚

Using this powerful command you can obtain you ip in the simplest format:
curl https://kakama.eu/eca/myip/

From Russia with love

A few months ago I was informed of an investigation into a type of fraud that sees some infrastructure based in Russia at the center of attention. I was contacted because Matrix had reported a domain that was later used for fraud.

This is the report:

https://urlscan.io/result/37dd713d-0cfe-4fd4-a377-1f154ecd2f4f/

This is the full article on Qurium:

https://www.qurium.org/alerts/deep-fake-video-of-maria-ressa-connected-to-cyberscam-network-in-russia

Following the chat with the journalist conducting the investigation, I developed some new indicators to detect this type of threat, you can find them (obviously on urlscan) here:

https://urlscan.io/search/#task.tags%3A%22m1top%22

Slack is great if you use it well

I have been using Slack for many years and in many projects I have been able to appreciate its features. It is a very powerful tool that unfortunately has a weak point: the user ๐Ÿ˜ฆ

Most people I know use it like Whatsapp or Sykpe. Failure to use the โ€œthreatโ€ feature turns Slack channels into a complete mess.

Below is the same discussion between me and myself using threads and making a mess. Obviously using threads is better!

For all the people who don’t use threads I have a question: why should we spend money on Slack when Whatsapp is free?

Setup ESPHome

In the previous post we saw how to connect our ESP2282 board via USB to our WSL. In this post we see how to use ESPHome into our WSL. If everything worked we will have the following configuration. As you can see we have the “ttyUSB0” device, this represents our board.

First we install the components missing from the default Python installation of WSL: “pip” and “venv”.

sudo apt update
sudo apt install python3-pip
sudo apt install python3.10-venv

Now let’s create the directories that we will use. The parent directory will be “ESPHome”, under this we will create “env” with the Python venv and “esphome” with the ESPHome repo clone.

mkdir ESPHome
cd ESPHome/
python3 -m venv env
git clone https://github.com/esphome/esphome

Now let’s activate the venv and install the ESPHome dependencies.

source env/bin/activate
cd  esphome
sudo python3 setup.py install

Once this is done we can verify that everything works by trying to invoke “esphome”.

As indicated in the documentation we can start the wizard to try to install our firmware on the board using this command

esphome wizard livingroom.yaml

If everything went well we can install the firmware on the board with the following command

esphome run livingroom.yaml --device /dev/ttyUSB0

The first run will take some time because it need to download all dependencies and libraries. At the end of the download the new firmware will be compiled and installed on the board.

Once the firmware has been installed, the board will be started and it will connect to the WIFI network configured during the wizard and in the output we will find all the information relating to the available WIFI network as well as the information relating to the WIFI network to which the device is connected.

Now that the board is installed and configured to use your WIFI, you can disconnect it from the USB port and power it using a power supply or another computer and connect to the board itself using WIFI, also to carry out a new firmware upload. To do this you can use the previous command omitting the device.

esphome run livingroom.yaml

If you get an error like this after uploading

you can fix it by using these commands to update protobuf

pip uninstall protobuf
pip cache remove protobuf
pip install --no-binary :all: protobuf

If the execution is successful you will get output similar to this.

I hope this article is useful to you. In the next few days I will continue with my experiments and I will try to write something useful for everyone ๐Ÿ™‚

Connect USB device to WSL

I decided to check out ESPHome. This is a very interesting project and I think I will write something about it here in the future too. For now, however, I thought I’d write a first quick post on how to connect a USB device to WSL. In fact, my workstation is a Windows 11 machine and for certain tasks I prefer to use Linux, WSL is perfect for me. However, the connection of USB devices is not automatic and therefore I describe the necessary steps here.

The device I will use as an example in this article is an ESP8266 board.

After connecting the board using a USB cable I find the new device in Device Manager

However, within WLS the device is not present.

To be able to connect the device to WSL it is necessary to follow some steps described in this article and install software. The link to the software to install is always present in this article:

https://learn.microsoft.com/en-us/windows/wsl/connect-usb

Once the software is installed you can use the “usbipd” command to connect the USB device to WSL. The command will need to be used within a PowerShell terminal started as administrator.

First of all, using “usbipd list” we are going to identify the device we want to connect to WSL.

In this case the device is identified by busid 2-4. Using the “usbipd” command with the “bind” option we are going to share the device.

At this point we can connect the device to WSL using the “attach” option.

The device is now connected to WSL ๐Ÿ™‚

Phishing attack against Wio

To be honest I didn’t know this bank. Today Matrix identified these two threats and so I did a little research into who they are. It is a bank based in the United Arab Emirates.

Looking at the wio.io website the first thing that struck me was that in the management section they don’t have a head of security.

There will probably be someone on the CEO or CTO’s staff, however I would give them more prominence ๐Ÿ˜‰

The domains involved in the attack are:

  • baeseters-wio[.]com
  • baeselers-wio[.]com
  • olabngsqwrxs[.]com

The domains baeseters-wio[.]com and baeselers-wio[.]com were registered a few hours ago.

The domain olabngsqwrxs[.]com was registered several days ago. I believe this domain is also used by other phishing site to collect stolen information.

The graphics of the site are quite similar to the original, too bad an idiot wrote “forggot”.

The kit is made up of two files, one (css.zip) which contains the graphic files and the information collection logic, the second (gate.zip) which receives the stolen information from the css/main.php page and sends it to olabngsqwrxs.com domain which presents a landing page when the subdirectory contains php files suitable for receiving the stolen information.

This site also uses techniques to avoid being tracked once online (default pages without content) too bad for them the Matrix agents are extremely efficient ๐Ÿ™‚

UPDATE ๐Ÿ™‚
More information on this LinkedIn post: https://www.linkedin.com/feed/update/urn:li:activity:7188217526160420865/

Phishing attack against Facebook users

This morning Matrix located a file containing Facebook user credentials stolen using a phishing attack.

The malicious site is “ab-portalwiedza.xyz”.

16 hours after the report of the attack, the site is still online even if the file containing the credentials is no longer visible, I imagine because the criminal changed its name.

The site presents itself as an article from the Polish news site “wiadomosci.wp.pl” and the article talks about an alleged particularly brutal news story.

At the end of the article, an alleged video is presented, to access which however Facebook credentials are required.

After entering the credentials in the popup that requests them, you will be redirected to Google. Credentials gone.

Intesa San Paolo phishing kit

A few hours ago Matrix identified a phishing kit targeting customers of the Italian bank Intesa San Paolo (intesasanpaolo[.]com).

This site is hosted on cprapid[.]com, the full url is weblntesasanpaolo[.]35-180-129-166[.]cprapid[.]com.

I just report it as malicious on urlscan.io.

The kit code is a mess ๐Ÿ˜ฆ I don’t think the low quality indicates attempts at evasion, more likely the author is a junior dev ๐Ÿ˜€
The code and comments are in Italian.

The author of the kit offers support to his criminal customers via the Smartsupp platform using the key 8a501f860d70f42e5100568c07885c9b3daa8ceb.

In an attempt to reduce the risk of being identified, in the configuration panel we find a flag set to make the phishing site visible only to mobile devices. Obviously it doesn’t work ๐Ÿ™‚