Another source of malware

One of the features of Matrix is โ€‹โ€‹monitoring on some resources that are detected as suspicious. This monitoring is useful to identify threats like this one I am writing about. An hour ago Matrix reported the site file-share-transfer[.]com as “opendir”, this is because there was no content inside.

A few minutes ago however the component that monitors the resources already detected, notified an update. Matrix then ran a scan again and detected an active threat.

The site presents itself as a classic file remote drive that requires you to open a document. By clicking on the button, your local file browser (explorer or finder) opens, showing a well-presented artifact that is not very clear for an inexperienced user, interface.

At first glance, in fact, you might think that the document presented is a local document, while in fact it is a link to a well-disguised remote file.

By proceeding, a link file is downloaded locally that references a malware that is downloaded from Alibaba’s cloud.

This attack is done fairly well, nothing particularly advanced but overall it is very fluid and credible. Performed towards a reality with little expertise it certainly has a good chance of success.

This leads us to understand how it is necessary to improve security at the infrastructure level because an attack like this will hardly be discovered by an average user. In my opinion, a more stringent sandbox on the browser and a more precise analysis would be necessary. My Chrome during this analysis did not highlight anything, the same for Defender. There is still a lot of work to do to make everyone safe.

Script kiddie in action

Today I was analyzing some Matrix collected phishing kits and this struck me.

First of all for the continuous duplication of code, there are ten files with practically the same code with minor changes, he could have made a functionโ€ฆ but unfortunately he is an idiot and so I come to the climax of the matter: the copyright on a redirect.

Also done badly because the variable is useless.

Such incompetent people are forced to steal because no one would give them a job in IT ๐Ÿ˜€

PostNL phishing kit (with video tutorial)

I recently came across this kit that targets PostNL customers.

The kit is currently still online.

Technically it’s not that great, the usual crap written badly in PHP; what I found funny was the “license”.


ะŸะพะปัŒะทะพะฒะฐั‚ะตะปัŒัะบะพะต ัะพะณะปะฐัˆะตะฝะธะต:

  • ะ‘ะปะพะบะธั€ะพะฒะบะฐ ะฝะฐ ะฒัะต RU ะผะฐัˆะธะฝั‹ (RU header).
  • ะŸั€ะพะดัƒะบั‚ ะฟะพัั‚ะฐะฒะปัะตั‚ัั “ะบะฐะบ ะตัั‚ัŒ”, ั„ัƒะฝะบั†ะธะพะฝะฐะป ะฒ ะพะฟะธัะฐะฝะธะธ ะบ ะฟั€ะพะดัƒะบั‚ัƒ.
  • ะะฒั‚ะพั€ ะฝะต ะฝะตัะตั‚ ะพั‚ะฒะตั‚ัั‚ะฒะตะฝะฝะพัั‚ะธ ะทะฐ ะฒะฐัˆะธ ะทะฐะบะพะฝะฝั‹ะต/ะฟั€ะพั‚ะธะฒะพะทะฐะบะพะฝะฝั‹ะต ะดะตะนัั‚ะฒะธั, ะฒ ั€ะตะทัƒะปัŒั‚ะฐั‚ะต ะบะพั‚ะพั€ั‹ั… ะฑั‹ะป ะฟั€ะธั‡ะตะฝะตะฝ ะฒั€ะตะด ะบะฐะบะพะผัƒ-ะปะธะฑะพ ะปะธั†ัƒ.
  • ะŸั€ะพะดัƒะบั‚ ะฝะตัะตั‚ ะฒ ัะตะฑะต ะธัะบะปัŽั‡ะธั‚ะตะปัŒะฝะพ ะพะทะฝะฐะบะพะผะธั‚ะตะปัŒะฝั‹ะน ั…ะฐั€ะฐะบั‚ะตั€ ะธ ะฟั€ะตะดะฝะฐะทะฝะฐั‡ะฐะตั‚ัั ะดะปั ะธะทัƒั‡ะตะฝะธั ะธ ั‚ะตัั‚ะธั€ะพะฒะฐะฝะธั ัะพะฑัั‚ะฒะตะฝะฝะพะน ะทะฐั‰ะธั‚ั‹.
  • ะŸะพะบัƒะฟะฐั‚ะตะปัŒ ะพะฑัะทัƒะตั‚ัั ะฝะต ะธัะฟะพะปัŒะทะพะฒะฐั‚ัŒ ะฟั€ะพะดัƒะบั‚ ะฝะฐ RU ะผะฐัˆะธะฝะฐั….
  • ะŸะพะบัƒะฟะฐั‚ะตะปัŒ ะฟั€ะธะพะฑั€ะตั‚ะฐะตั‚ ะฟั€ะพะดัƒะบั‚ ะปะธั‡ะฝะพ, ะฟะพะดะดะตั€ะถะบะฐ ะพะบะฐะทั‹ะฒะฐะตั‚ัั ั‚ะพะปัŒะบะพ ะบะพะฝั‚ะฐะบั‚ัƒ ั ะบะพั‚ะพั€ะพะณะพ ะฑั‹ะปะฐ ะพะฟะปะฐั‚ะฐ.
  • ะ—ะฐะฟั€ะตั‰ะตะฝะพ ะฒั‹ะบะปะฐะดั‹ะฒะฐั‚ัŒ ะฒ ะฟัƒะฑะปะธั‡ะฝั‹ะน ะดะพัั‚ัƒะฟ ั„ะฐะนะปั‹ ะฟั€ะพะดัƒะบั‚ะฐ ะธ ะฐะดะผะธะฝะบะธ, ัั‚ะพ ะฟะพะฒะปะตั‡ะตั‚ ะฑะปะพะบะธั€ะพะฒะบัƒ ะปะธั†ะตะฝะทะธะธ ะฒะปะฐะดะตะปัŒั†ะฐ.

User Agreement:

  • Block on all RU of the machine (RU header).
  • Product is delivered “as is,” the functionality in the product description.
  • Author is not responsible for your lawful/unlawful actions resulting in harm to any person.
  • Product is exclusively exploratory in nature and is intended to study and test its own protection.
  • Buyer undertakes not to use the product on RU machines.
  • Buyer purchases the product in person, which is supported only by the contact from whom the payment was made.
  • It is forbidden to upload product and admin files to public access, this will lead to the blocking of the owner’s license.

The video explaining how to install it is also very useful.

Whois info below

Domain Name: HELPDESK-TEST.ONLINE
Registry Domain ID: D479803092-CNIC
Registrar WHOIS Server: whois.namecheap.com
Registrar URL: https://namecheap.com
Updated Date: 2024-08-20T07:52:01.0Z
Creation Date: 2024-08-20T07:51:58.0Z
Registry Expiry Date: 2025-08-20T23:59:59.0Z
Registrar: Namecheap
Registrar IANA ID: 1068
Domain Status: serverTransferProhibited https://icann.org/epp#serverTransferProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: addPeriod https://icann.org/epp#addPeriod
Registrant Organization: Privacy service provided by Withheld for Privacy ehf
Registrant State/Province: Capital Region
Registrant Country: IS
Registrant Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Admin Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Tech Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Name Server: DNS1.NAMECHEAPHOSTING.COM
Name Server: DNS2.NAMECHEAPHOSTING.COM
DNSSEC: unsigned
Billing Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Registrar Abuse Contact Email: abuse@namecheap.com
Registrar Abuse Contact Phone: +1.9854014545
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of WHOIS database: 2024-08-21T10:14:38.0Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

>>> IMPORTANT INFORMATION ABOUT THE DEPLOYMENT OF RDAP: please visit
https://www.centralnicregistry.com/support/rdap <<<

The Whois and RDAP services are provided by CentralNic, and contain
information pertaining to Internet domain names registered by our
our customers. By using this service you are agreeing (1) not to use any
information presented here for any purpose other than determining
ownership of domain names, (2) not to store or reproduce this data in
any way, (3) not to use any high-volume, automated, electronic processes
to obtain data from this service. Abuse of this service is monitored and
actions in contravention of these terms will result in being permanently
blacklisted. All data is (c) CentralNic Ltd (https://www.centralnicregistry.com)

Access to the Whois and RDAP services is rate limited. For more
information, visit https://registrar-console.centralnicregistry.com/pub/whois_guidance.

The domain was registered a few hours ago at Namecheap and in the tutorial we use Namecheap as the hosting platform for the content.

Tale of a scam

This morning I dedicated half an hour to understand something better about a scam that I had understood to be a scam without ever having seen it in action.

I’ll start with a shortened link I received. A page opens with the graphics of a well-known Italian newspaper (La Repubblica) presenting a series of articles and testimonials on a way to get rich without doing shit.
hxxp://larepubblica[.]vipcanberich[.]top/bx4ng7rcoxggna6/d4wgksheywr/rwrcvjbk/
The page, even if poorly made, could be plausible for someone who is not very smart (there are people who believe in the flat earth…)

All the links on the page lead to a form to be filled out with name, surname, email, telephone number.

I fill out the form and after submitting it I find myself on a page that looks like an online trading dashboard.

The page contains the data I sent. Within a few seconds I receive a call from the number +390645220040, on the other end a young man who says his name is Fabrizio. From the way he speaks you can tell that he is not a native Italian speaker.

He introduces himself, chats and asks me to visit the site hxxps://weonmarket[.]com.

I do it and I find myself back on the previous dashboard. He asks me to visit some pages of this site trying to instill confidence in the system and asks me to send a message in a chat. I do it and after a few seconds I receive the link (hxxps://furyquick[.]io/pjprpZ) to make the first deposit of 250 euros.

I click on the link and I find myself on a checkout page of a Bulgarian site that sells training courses. I make an excuse and end the call (I told him I only have an AMEX card which I saw was not accepted by the platform).

I just receive also an email with information about my pending payment

All very simple.

So, now, what do we know?

  • Do not click on links received via email, text message or WhatsApp. It doesn’t matter if we think we know the sender.
  • Information has value based on its source. The source must be verified. If you are unable to verify a source or don’t feel like doing so you will probably mess up. Especially if you go to vote.
  • The phone number +390645220040 is used to scam.
  • The website weonmarket[.]com is used for scamming.
  • The intensibio[.]com website is used as a platform to receive money from the scams carried out by these gentlemen.
  • The furyquick.io site is used to create links to the intensibio[.]com site
  • The scam only works if you don’t want to use an American Express card. AMEX is not an accepted payment method.

From Russia with love

A few months ago I was informed of an investigation into a type of fraud that sees some infrastructure based in Russia at the center of attention. I was contacted because Matrix had reported a domain that was later used for fraud.

This is the report:

https://urlscan.io/result/37dd713d-0cfe-4fd4-a377-1f154ecd2f4f/

This is the full article on Qurium:

https://www.qurium.org/alerts/deep-fake-video-of-maria-ressa-connected-to-cyberscam-network-in-russia

Following the chat with the journalist conducting the investigation, I developed some new indicators to detect this type of threat, you can find them (obviously on urlscan) here:

https://urlscan.io/search/#task.tags%3A%22m1top%22

Phishing attack against Wio

To be honest I didn’t know this bank. Today Matrix identified these two threats and so I did a little research into who they are. It is a bank based in the United Arab Emirates.

Looking at the wio.io website the first thing that struck me was that in the management section they don’t have a head of security.

There will probably be someone on the CEO or CTO’s staff, however I would give them more prominence ๐Ÿ˜‰

The domains involved in the attack are:

  • baeseters-wio[.]com
  • baeselers-wio[.]com
  • olabngsqwrxs[.]com

The domains baeseters-wio[.]com and baeselers-wio[.]com were registered a few hours ago.

The domain olabngsqwrxs[.]com was registered several days ago. I believe this domain is also used by other phishing site to collect stolen information.

The graphics of the site are quite similar to the original, too bad an idiot wrote “forggot”.

The kit is made up of two files, one (css.zip) which contains the graphic files and the information collection logic, the second (gate.zip) which receives the stolen information from the css/main.php page and sends it to olabngsqwrxs.com domain which presents a landing page when the subdirectory contains php files suitable for receiving the stolen information.

This site also uses techniques to avoid being tracked once online (default pages without content) too bad for them the Matrix agents are extremely efficient ๐Ÿ™‚

UPDATE ๐Ÿ™‚
More information on this LinkedIn post: https://www.linkedin.com/feed/update/urn:li:activity:7188217526160420865/

Phishing attack against Facebook users

This morning Matrix located a file containing Facebook user credentials stolen using a phishing attack.

The malicious site is “ab-portalwiedza.xyz”.

16 hours after the report of the attack, the site is still online even if the file containing the credentials is no longer visible, I imagine because the criminal changed its name.

The site presents itself as an article from the Polish news site “wiadomosci.wp.pl” and the article talks about an alleged particularly brutal news story.

At the end of the article, an alleged video is presented, to access which however Facebook credentials are required.

After entering the credentials in the popup that requests them, you will be redirected to Google. Credentials gone.

Intesa San Paolo phishing kit

A few hours ago Matrix identified a phishing kit targeting customers of the Italian bank Intesa San Paolo (intesasanpaolo[.]com).

This site is hosted on cprapid[.]com, the full url is weblntesasanpaolo[.]35-180-129-166[.]cprapid[.]com.

I just report it as malicious on urlscan.io.

The kit code is a mess ๐Ÿ˜ฆ I don’t think the low quality indicates attempts at evasion, more likely the author is a junior dev ๐Ÿ˜€
The code and comments are in Italian.

The author of the kit offers support to his criminal customers via the Smartsupp platform using the key 8a501f860d70f42e5100568c07885c9b3daa8ceb.

In an attempt to reduce the risk of being identified, in the configuration panel we find a flag set to make the phishing site visible only to mobile devices. Obviously it doesn’t work ๐Ÿ™‚

An Italian solution

This morning I wanted to write a short post on a phishing site, which was also poorly made, but which using IPFS could be a little more interesting than the others.

The site is an attack (targeted or not I don’t know) against some company that wants to become a supplier to the US government.
The URL is: hxxps://gsa.gov.bid-network-integration-authenticate.sapt[.]sa

Matrix had identified the threat in the morning

When I tried to access the content on IPFS from my laboratory network (in Italy) I was in for a surprise: access to the Cloudflare gateway to IPFS is blocked by Italian providers with the explanation that it contains child pornography!

I can understand someone’s difficulty in understanding the technology, I can understand the lack of funds to invest in research, but censoring an emerging technology like this is truly third world country!

Obviously using TOR the powerful censorship is avoided in a minute and I can finally access.

Let’s put aside the attack that sucks and doesn’t even work at the moment, but what approach is it to block an entire world because you don’t understand it? I know that in Italy there are many nostalgic for that idiot Mussolini, but here it seems that someone is even nostalgic for the Middle Ages!

Attack against Zoom

Today I’ll tell you about an attack detected a few hours ago by Matrix and reported on urlscan.io.

This is a fairly complex attack against Zoom. The attackers registered on Namecheap a domain (us06webzoomus[.]pro) reminiscent of Zoom subdomains and deployed a series of files.

Here we find three malware (Android and Windows), static content (scripts, images, etc.), a batch for Windows using Powershell.

The contents are in Russian.

If I find the time I will update the article with details about the malware, if I don’t find the time, anyway you know not to run these executables ๐Ÿ™‚