Correios phishing kit

In the last few weeks I have noticed that attacks on Correios are constant. I have studied the matter a bit: it is the Brazilian state company that manages shipments and payments related to them.

The scam is always the same, attackers write to users saying that a shipment is blocked and that a small payment is needed to unblock it. What is interesting about this attack is that the user by entering the CPF (Cadastro de Pessoas Físicas) gets his data displayed on the page and this certainly appears to the user as something reliable.

The domain used for the attack is cpf-pendente[.]co[.]ua and it was registered few hours ago.

The first curiosity is that the archive is a RAR instead of a ZIP. Someone hoped to make life difficult for Matrix but I love writing code and this allows Matrix to open different types of archives, including obviously RAR 🙂

Aside from the type of archive, my curiosity about this kit was given by the functionality of extracting user data starting from the CPF. I do not know the Brazilian law but that from a simple number you can extract personal data seems unsafe to me.

The kit uses an external service to resolve the client data. This service I assume is part of the attack and probably uses another service in turn, perhaps legitimate or a leak from who knows where. This service is available at the domain anonimobusca[.]online. It was registered one week ago.

To obtain the user information, the phishing kit, uses a specific resource exposed by the second domain

Another aspect is related to how payments are collected. The kit does not in fact collect itself he payment data. The user makes the payment using systems that manage transactions. The services used to perform the transactions are:

  • paguesafe[.]com
  • atlaspagamentos[.]com

The URLs used are:

  • hxxps://checkout[.]paguesafe[.]io/pl/mn7xXvjg2N
  • hxxps://checkout[.]atlaspagamentos[.]com/pl/RQ9Kz7XTf8

Both services have been active for a short time, they use cheap providers for domain management and have free certificates. In short, I would say that nothing seems to give trust to these services.

To this I would like to add that the two graphical interfaces are practically the same.

Phishing against Kraken

At the end of a pretty busy day, I finally found a few minutes to check out the incoming notifications from Matrix. I noticed a kit that targets Kraken customers because their icon reminds me of the ghost from Pacman, and just today I got the vintage Pacman console 🙂

The domain used for the attack is krakeeen[.]top. It was registered three days ago and Matrix keep the monitoring active waiting for the kit. It arrives some hours ago. Thanks attacker 🙂

At the moment the only reports on this matter are those made by Matrix.

As usual, the kit is PHP based.

Every now and then someone tells me that my posts seem like I don’t love it! That’s not true, I really like PHP and often the code is badly written and therefore sucks.

I love PHP and its community!!!!!

As for the stolen credentials, the kit requires that they be sent to the email address hardeyholar47@gmail[.]com.

Of course I added it to the list that I hope you already know 🙂

Attack against Correios

This morning I came across a kit aimed at Brazilian taxpayers. The domain used for the attack is consultarencomeda[.]online

The attack is currently in its initial phase, the domain was registered a few hours ago and the kit was copied to the hosting. Matrix intercepted these two activities, analyzed the archive containing the kit and sent the notification to Urlscan. To date, no one reports this site as malicious.

The default page of the kit mimics a Hostinger landing page in an attempt to block crawlers.

Opening the kit we discover how it works. At the base there is always the attempt to put pressure on the user, here the payment of a fee is demanded.

Without wasting time on how the kit works, as always it is poorly written PHP code, I highlight the channels that are used for payment and sending notifications to the customer.

The transaction takes place through a service provided by the domain codetech-payment-fanpass[.]rancher[.]codefabrik[.]dev

This service has no internet presence, is not advertised nor have I been able to figure out who it is associated with.

Sending notifications is implemented by pushcut[.]io, of course this is a legitimate service and the presence of a key in the kit, I hope it can help the company to identify the abuse.

From Russia with love

A few months ago I was informed of an investigation into a type of fraud that sees some infrastructure based in Russia at the center of attention. I was contacted because Matrix had reported a domain that was later used for fraud.

This is the report:

https://urlscan.io/result/37dd713d-0cfe-4fd4-a377-1f154ecd2f4f/

This is the full article on Qurium:

https://www.qurium.org/alerts/deep-fake-video-of-maria-ressa-connected-to-cyberscam-network-in-russia

Following the chat with the journalist conducting the investigation, I developed some new indicators to detect this type of threat, you can find them (obviously on urlscan) here:

https://urlscan.io/search/#task.tags%3A%22m1top%22

Phishing attack against Wio

To be honest I didn’t know this bank. Today Matrix identified these two threats and so I did a little research into who they are. It is a bank based in the United Arab Emirates.

Looking at the wio.io website the first thing that struck me was that in the management section they don’t have a head of security.

There will probably be someone on the CEO or CTO’s staff, however I would give them more prominence 😉

The domains involved in the attack are:

  • baeseters-wio[.]com
  • baeselers-wio[.]com
  • olabngsqwrxs[.]com

The domains baeseters-wio[.]com and baeselers-wio[.]com were registered a few hours ago.

The domain olabngsqwrxs[.]com was registered several days ago. I believe this domain is also used by other phishing site to collect stolen information.

The graphics of the site are quite similar to the original, too bad an idiot wrote “forggot”.

The kit is made up of two files, one (css.zip) which contains the graphic files and the information collection logic, the second (gate.zip) which receives the stolen information from the css/main.php page and sends it to olabngsqwrxs.com domain which presents a landing page when the subdirectory contains php files suitable for receiving the stolen information.

This site also uses techniques to avoid being tracked once online (default pages without content) too bad for them the Matrix agents are extremely efficient 🙂

UPDATE 🙂
More information on this LinkedIn post: https://www.linkedin.com/feed/update/urn:li:activity:7188217526160420865/

Intesa San Paolo phishing kit

A few hours ago Matrix identified a phishing kit targeting customers of the Italian bank Intesa San Paolo (intesasanpaolo[.]com).

This site is hosted on cprapid[.]com, the full url is weblntesasanpaolo[.]35-180-129-166[.]cprapid[.]com.

I just report it as malicious on urlscan.io.

The kit code is a mess 😦 I don’t think the low quality indicates attempts at evasion, more likely the author is a junior dev 😀
The code and comments are in Italian.

The author of the kit offers support to his criminal customers via the Smartsupp platform using the key 8a501f860d70f42e5100568c07885c9b3daa8ceb.

In an attempt to reduce the risk of being identified, in the configuration panel we find a flag set to make the phishing site visible only to mobile devices. Obviously it doesn’t work 🙂

Phishing campaign based on .best domains

A new tool launched in recent days has made it possible to quickly detect an attack based on various .best domains.
Matrix had reported these domains on urlscan.io several hours ago.

From the evidence gathered in recent minutes, it appears that the attack targeted customers of the US bank America First Credit Union.

Below is the list of domains involved.

  • ab5[.]best
  • ab8[.]best
  • ah4[.]best
  • aj0[.]best
  • aj2[.]best
  • ak0[.]best
  • al6[.]best
  • al7[.]best
  • an6[.]best
  • ao7[.]best
  • ar0[.]best
  • ay5[.]best
  • aw5[.]best
  • az4[.]best
  • bb3[.]best
  • bc0[.]best
  • bd5[.]best
  • be7[.]best
  • bf8[.]best
  • br5[.]best
  • bs6[.]best
  • bv3[.]best
  • bv6[.]best
  • bw5[.]best
  • bx3[.]best
  • eo0[.]best
  • ed4[.]best
  • ed5[.]best
  • ei2[.]best
  • ei5[.]best
  • ei8[.]best
  • ej5[.]best
  • el0[.]best
  • em3[.]best
  • en8[.]best
  • eo0[.]best
  • er0[.]best
  • er5[.]best
  • eu5[.]best
  • eu9[.]best
  • ev2[.]best
  • ex9[.]best
  • fa5[.]best
  • fa7[.]best
  • fa9[.]best
  • fb3[.]best
  • fg0[.]best
  • fj7[.]best

REALFLIGHT EVOLUTION on Lenovo ThinkCentre neo 30a

I think it’s been about 30 years since I’ve installed a game on my computer. The last one I think was Gunship 2000 or something!
Today, however, I installed this simulator for model aircraft.

From the videos and comments it seemed like a well-made product and so I decided to buy it to learn how to drive model aircraft and to be able to do something useful during some online meetings.

I had read about some problems with Intel graphics cards but being an optimist I decided I would fix it. Indeed it was, I had to work on it a bit but in the end everything works 🙂

After installing it using Steam (which I didn’t know about but it seems to me a fantastic object) the game started without problems, only that instead of letting me do anything it presented me with a model aircraft stopped on the runway. Searching on the Internet on the various forums there was talk of switching to the use of the beta version “dxvk-intel.fix” which could have solved the problem.

To use the beta version, simply enter the game properties, select the “Betas” item, select the “dxvk-intel-fix” beta, close the window with the “x” and restart the game.

When I restarted the game I got an error message telling me that the graphics card was not working properly. To solve this problem I downloaded these drivers and after the installation I restarted my computer as requested and after the reboot everything started working fine 🙂