Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Email Phishing. Show all posts

Growing Concerns Over Deceptive Master Password Reset Emails

 


A network security risk associated with unauthorized password resets is very significant, as it can expose sensitive information and systems to cyber threats. IT administrators must take care to monitor and validate every password reset, particularly those that involve critical user accounts and service accounts. When such resets occur, administrators typically need detailed contextual information to maintain robust security whenever such resets occur. 

To enhance transparency in password resets and to prevent the possibility of unauthorized access, it is important to notify the respective users as soon as possible when their passwords are reset. Despite this, manual oversight of password resets poses a daunting challenge. It requires considerable effort and vigilance to track every reset, analyze its context, identify high-risk account changes, and validate that they are legitimate. 

As administrators, it can be difficult for them to mitigate security vulnerabilities arising from unauthorized or suspicious password changes, if there is no efficient mechanism in place. Microsoft users are constantly faced with cybersecurity threats, as well as sophisticated attacks based on system vulnerabilities. As the security landscape continues to evolve, it becomes increasingly complex as zero-day exploits actively compromise Windows users, as well as Microsoft Account takeovers that circumvent authentication measures. 

Cybercriminals have become increasingly aggressive against Microsoft 365 users, targeting them with technical loopholes that allow them to manipulate URLs or conduct large-scale brute-force attacks by utilizing basic authentication exploits. This persistent threat highlights the necessity of enhanced security measures within the Microsoft ecosystem. Recently, Microsoft 365 users have been warned of a highly sophisticated attack that manages to evade conventional email security measures. During this latest phishing attack, cybercriminals have embedded phishing lures within legitimate Microsoft communications, making detection considerably harder. 

As these tactics are constantly evolving, organizations and their users must remain vigilant, implement proactive security strategies, and make sure that potential risks are minimized. This type of cybercrime involves deceptive actors impersonating trusted organizations or individuals and deceiving recipients into divulging sensitive information as a result. The fraud is usually carried out by sending emails or sending attachments to unsuspecting recipients that contain harmful links or attachments, which are intended to harvest login credentials, financial information, and other confidential data from those unsuspecting. 

Even though there are different kinds of phishing, deceptive phishing remains one of the most prevalent since it bypasses security defences so effectively. Cybercriminals instead of attempting to compromise a system through technical vulnerabilities, exploit human psychology by crafting appealing messages that seem to be genuine to lure individuals into engaging with malicious content, rather than using technical vulnerabilities. In addition to raising awareness and educating users about the threats that can be posed by phishing, they must know how to identify and prevent such threats to improve their cybersecurity resilience. 

Types of Phishing Attacks


Several different types of phishing attacks operate by utilizing human trust to steal sensitive information. Below is a list of the most common types: 

Phishing emails (or deceptive phishing emails) take advantage of recipients' trust by looking like legitimate organizations so they will divulge their personal and financial information to them. 

Phishing traps: They are created to exploit the vulnerabilities in an organization's IT infrastructure to gain access to its data. An example of spear-phishing is a form of phishing that uses personalized information to look credible to a specific individual, such as an employee or manager. 

A phishing Angler: This type of fraud uses fake social media accounts to gain access to a user's account or to download malicious software onto their computer. Using urgent espionage-related pretexts to extract sensitive business information from high-level executives is referred to as whaling. It is a form of fraud in which someone calls someone who pretends to be an official of a trustworthy organization to obtain personal or financial information. 

A text phishing scam (smishing) takes advantage of SMS message spam to deceive users by sending malicious links or sending fake, urgent emails. In this case, the user is not aware of the fact that his browser settings have changed, causing him to be redirected to fraudulent websites without his knowledge. 

Due to the constantly evolving nature of phishing attacks, security awareness and proactive measures are becoming increasingly important. Several measures can be taken to prevent these attacks, such as multi-factor authentication, email filtering, and caution when dealing with online accounts. 

Understanding Password Reset Processes and Vulnerabilities


To assist users who forgot their passwords on online platforms that require user authentication, most platforms have implemented password reset mechanisms. Various methods of generating a unique, high-entropy reset token that is linked to the user's account are the most commonly used methods, although they vary greatly in security and complexity. 

The platform can request that a user be sent an email containing a reset link, with the token embedded as a query parameter in the link. When the user clicks the link, a verification process is conducted to ensure the token is valid before allowing the user to reset their password. It is generally considered secure because this method relies on the assumption that only the intended user to whom the token is sent has access to their email account. However, attackers can exploit vulnerabilities in this process by manipulating password reset data. 

Exploiting Password Reset Poisoning Attacks


An attacker who has manipulated the password reset URL to steal the user's reset token is called a password reset poisoner. The technique takes advantage of systems that automatically generate username and password reset links based on user-controlled input, such as the Host header. The routine goes as follows: 

As soon as the attacker has obtained the victim's email address or username, they send the victim an email asking for their password to be reset. During this process, they intercept the HTTP request and alter the Host header to replace the legitimate domain with one they control. In an official password reset email, the victim receives an official link that appears to contain a legitimate link. However, once the victim clicks on the official link, he or she is directed to the attacker's domain, so they are unable to reset their password. 

A token is sent to the attacker's server when the victim clicks on the link, whether by hand or automatically using security tools like antivirus scanners. Upon submitting the stolen token to the legitimate website, the attacker gains unauthorized access to the victim's account by resetting the password and then regaining access to the victim's account. 


Mitigation Strategies and Security Best Practices 


Sites need to implement strong security measures to prevent password reset poisoning, especially when it comes to Host header validation, and the enforcement of secure cookie-based authentication so that individual users are not able to access their passwords. The user should also exercise caution if he or she receives emails asking to reset their passwords unexpectedly, ensure URLs are verified before clicking links, and enable multifactor authentication to protect their accounts. Cybercriminals are constantly improving their attack methods. 

To mitigate these threats, proactive cybersecurity awareness and robust security implementation are key. According to the fraudulent email in question, recipients are informed that their email passwords are imminently about to expire, and are advised that once their passwords are about to expire, they will need to contact a system administrator to regain access. 

As a means of creating a sense of urgency, the message asks users to click on the "KEEP MY PASSWORD" button, which appears to authenticate and secure their account. The email communication appears to be carefully crafted so that it appears to be a notification from the web hosting server, which makes it more likely that unknowing individuals will be able to trust it. As a result of clicking the link provided, recipients will be taken to a fraudulent Webmail login page designed to capture their email credentials, which include usernames and passwords, when they click that link. 

As a result of this stolen information, cybercriminals can breach email accounts, obtaining access to personal communications, confidential documents, and sensitive information that is confidential or sensitive. When these accounts have been compromised, they may be used to launch further phishing attacks, distribute malware to contacts within the email system, or launch further phishing attacks once the accounts have been compromised. 

Besides immediate unauthorized access, threat actors may also use stolen credentials to reset passwords for other accounts connected to the account, such as a banking platform, a social media profile, or even a cloud storage platform. Aside from this, compromised accounts and harvested information are often sold on the dark web, thus increasing the risk of identity theft as well as financial fraud. 

Because of the significant security implications these emails have, it is highly recommended that users exercise caution whenever they receive unsolicited emails with links or attachments within them. It is important to verify the legitimacy of these communications before engaging with them so that potential cyber breaches, financial losses, and other cybersecurity threats can be prevented. 

An official representative of 1Password, known as 1PasswordCSBlake, recently provided some insights on how to counter a recent phishing attack targeting master password resets on the 1Password subreddit. A detailed explanation of how cybercriminals approach credentials compromises through fraudulent reset requests was provided, emphasizing the significance of vigilance against such insidious techniques used by cybercriminals to deceive their victims. 

Consequently, users who feel that they have been phished or have clicked on a fraudulent link as a result of this security threat are strongly advised to reach out to support@1password.com immediately for assistance. It is important to act promptly if you want to minimize potential risks and prevent unauthorized access to sensitive data. 

The 1Password infrastructure does not appear to have been compromised, and there are no indications at this time that the system is compromised. The password manager is still secure, and the users' accounts and stored credentials are not affected. To safeguard your personal information from emerging cyber threats, you must keep your personal information aware and adhere to best security practices. 

Best Practices for Preventing Malware Infiltration 


There are many ways for users to mitigate cybersecurity threats, but they need to be cautious when dealing with unexpected or unsolicited e-mails, especially those from unknown sources. As a consequence, one mustn't click on embedded links or open attachments within such messages, since they may contain malicious content that compromises the security of the system as a whole. 

The use of anti-virus software and anti-malware software to safeguard devices against potential threats is essential. Additionally, users should only download applications and files from trusted and official sources, such as verified websites and app stores. As a result, downloading pirated software, key generators, or cracking tools can significantly increase the risk of malware infection. 

Therefore, users need to avoid them as much as possible. Also, it is important to note that engaging with intrusive pop-ups and advertisements on untrustworthy websites may pose a considerable security risk, and this should be avoided if possible. This can be achieved by denying notification permissions for these sites, and by regularly updating operating systems and applications to keep them protected. 

If malicious attachments have already been accessed, it is recommended, to detect and effectively remove any malware infiltrated into the system, that the system be thoroughly scanned using security software that is considered reliable and provides reliable protection against malware.

Millions of Email Servers Found Vulnerable in Encryption Analysis

 


In a new study published by ShadowServer, it was revealed that 3.3 million POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol) servers are currently at risk of network sniffing attacks because they are not encrypting their data using TLS. 

Using IMAP, users can access their emails from different devices, while keeping messages on the server. With POP3, however, the messages are downloaded to one specific device, which restricts access to that particular device, resulting in IMAP and POP3 being used to access email. Mail servers can be accessed through two different methods: POP3 and IMAP. POP3 is a way to access email through a server. 

A good reason to use IMAP is that it stores users' emails on the server and synchronizes them across all their devices. This allows them to check their inbox across multiple devices, such as laptops and phones. However, POP3 works by downloading emails from the server and making them only accessible from the device from which they were downloaded. Additionally, there is no denying that many hosting companies configure POP3 and IMAP services by default, even though most users do not use them. 

It is important to note that it is very common to have those services configured by default. To ensure that TLS is enabled, and all email users use the latest version of the protocol, the organization advised them to check with their email provider. With the latest versions of Apple, Google, Microsoft, and Mozilla email platforms, users can rest assured that their information is already protected thanks to the TLS encryption protocol. 

To securely exchange and access emails across the Internet using client/server applications, the TLS secure communication protocol helps secure users' information while exchanging and accessing. In the absence of TLS encryption, the messages' content and credentials are sent in clear text, making them susceptible to network sniffing attacks that could eavesdrop on them. In the sense of a security protocol, TLS, or Transport Layer Security, is an Internet-based security protocol used for secure web browsing as well as encrypting emails, file transfers, and messaging messages. It is used to provide end-to-end security between applications over the Internet. 

It is the role of TLS to keep hackers away from sniffing the network, encrypting users' email credentials and message contents instead of sending them as plain text, which helps to prevent hackers from sniffing the network. As an alternative to TLS encryption, it is also possible for anyone to sniff out that information without encryption. To find out 3.3 million hosts that do not support TLS, ShadowServer scanned the internet for POP3 services running on ports 110 and 995. 

As of 2006, there has been widespread use of TLS 1.1 as an improvement over TLS 1.0, which had been introduced to the market in 1999, and TLS 1.0 remained in use until this very day. Having discussed and developed 28 protocol drafts, the Internet Engineering Task Force (IETF) approved TLS 1.3, the next major version of the TLS protocol, in March of 2018, after extensive discussions and development of 28 drafts. 

Without TLS, passwords for mail access could be intercepted, and exposed services could allow a password-guessing attack on the server, and without TLS, passwords could be intercepted, and the server could suffer from password-guessing attacks. Hosts can be eavesdropping on network sniffer attacks if credentials and message content are sent in clear text without encryption. 

It is estimated that about 900,000 of these sites reside in the United States with over 500,000 being in Germany and Poland with 380,000 being in Germany. However according to the researchers, no matter whether TLS is enabled or not, service exposure could result in a password-guessing attack against the server. As part of the coordinated announcement made by Microsoft, Google, Apple, and Mozilla in October 2018 informing the public that insecure TLS 1.0 and TLS 1.1 protocols would be retired in 2020, Microsoft, Google, Apple, and Mozilla announced their intentions. As of August 2020, the latest Windows 10 Insider builds have begun using TLS 1.3 by default. 

The National Security Agency also released a guide in January 2021 detailing how outdated versions of the TLS protocol, configurations, and versions can be identified and replaced with current, secure solutions. As a ShadowServer foundation spokesperson pointed out, “regardless of whether TLS is enabled or not, service exposure may enable password guessing attacks against the server regardless of whether TLS is enabled.” 

Email users are urged to make sure that their email service provider indeed enables TLS and that their email service provider is using the current version of the protocol. Regardless of whether they are using Apple, Google, Microsoft, or Mozilla email platforms, users need not be worried since they all support TLS and use the latest versions of it.

How to Protect Yourself Against Phishing Extortion Scams Involving Personal Data

 

Imagine receiving an email with a photo of your house, address, and a threatening message that seems ripped from a horror movie. Unfortunately, this is the reality of modern phishing scams, where attackers use personal information to intimidate victims into paying money, often in cryptocurrency like Bitcoin. One victim, Jamie Beckland, chief product officer at APIContext, received a message claiming to have embarrassing video footage of him, demanding payment to keep it private. 

While such emails appear terrifying, there are ways to verify and protect yourself. Many images in these scams, such as photos of homes, are copied from Google Maps or other online sources, so confirming this can quickly expose the scam. To check if an image is pulled from the internet, compare it to Google Maps street views. Additionally, always scrutinize email addresses for legitimacy. Cybersecurity expert Al Iverson from Valimail advises checking for any small variations in the sender’s email domain and examining SPF, DKIM, and DMARC authentication results to determine if the email domain is real. 

Be cautious if a message appears to come from your own email address, as it’s often just a spoofed sender. Links in phishing emails can lead to dangerous sites. Founder of Loop8, Zarik Megerdichian, recommends extreme caution and encourages reporting such scams to the Federal Trade Commission (FTC). Monitoring your financial accounts, disputing unauthorized charges, and updating or canceling compromised payment methods are other essential steps. To reduce vulnerability, it’s wise to change your passwords, set up a VPN, and isolate your network. Yashin Manraj, CEO of Pvotal Technologies, suggests transferring critical accounts to a new email, informing your family about the scam, and reporting it to law enforcement, such as the FBI, if necessary. 

One of the best defenses against these types of scams is to control your data proactively. Only share essential information with businesses, and avoid giving excessive details to online services. Megerdichian emphasizes the importance of asking whether every piece of data is truly necessary, as oversharing can open the door to future scams. 

With these strategies, individuals can better protect themselves from extortion phishing scams. It’s crucial to stay vigilant and avoid interacting with suspicious emails, as this will help shield you from falling victim to increasingly sophisticated cyber threats.

Protect Yourself from Phishing Scams Involving Personal Data and Bitcoin Demands

 

A new phishing scam is emerging, where hackers send threatening emails to people with personal details like images of their homes and addresses. This scam tricks recipients into believing their privacy is compromised, urging them to pay money or Bitcoin to avoid exposure. According to cyber expert Al Iverson, scammers often use public sources like Google Maps and data from previous breaches to craft these threatening messages. He recommends confirming any images on Google Maps and checking email legitimacy to ensure the message isn’t a scam. 

One victim, Jamie Beckland, shared his experience, revealing that the scammers falsely claimed to have video evidence from spyware on his computer. Beckland, like others, was targeted with demands for Bitcoin in exchange for silence. Fortunately, by cross-referencing the address and photo in the email with Google Maps, he realized the threat wasn’t credible. To avoid falling for such scams, it’s critical to scrutinize email addresses and domains. Iverson advises checking SPF, DKIM, and DMARC results, which help verify the sender’s legitimacy. Scammers often spoof email addresses, making them appear familiar, but most don’t actually have access to sensitive data—they’re simply trying to scare people into paying. 

Zarik Megerdichian, founder of Loop8, strongly warns against clicking any unfamiliar links in these emails, especially those related to payments. Bitcoin and similar transactions are irreversible, making it crucial to avoid engaging with scammers. If you suspect financial information is at risk, Megerdichian advises reporting the incident to the Federal Trade Commission (FTC) and closely monitoring your accounts. Yashin Manraj, CEO of Pvotal Technologies, recommends changing passwords immediately if you suspect your data has been compromised. Moving sensitive accounts to a new email address can provide added protection. He also suggests notifying local authorities like the FBI, while ensuring that family members are informed of the scam to prevent further risks. 

Lastly, Manraj emphasizes that you should never engage with scammers. Responding to emails only increases your vulnerability, adding your information to target databases. To further protect yourself, isolating your home network, using a VPN, and avoiding public forums for help are essential steps in safeguarding your information from potential future attacks. These phishing scams, though threatening, rely on fear and manipulation. By taking steps to verify email legitimacy, securing your accounts, and staying cautious, you can avoid falling victim to these tactics.

New Email Scam Targets NTLM Hashes in Covert Data Theft Operation

 


TA577 has been identified as a notorious threat actor who orchestrated a sophisticated phishing campaign, according to researchers at security firm Proofpoint. Currently, the group is utilizing a new method of phishing involving ZIP archive attachments. This tactic is geared towards pilfering the hash data of NT LAN Manager (NTLM) users.

According to our investigation, this group is utilizing a chain of attacks aimed at stealing authentication information from the NT LAN Manager (NTLM) system. It would be possible to exploit this method for obtaining sensitive data and facilitating further malicious activity if this method were to be exploited. 

By using booby-trapped email attachments containing booby-trapped NTLM hashes to steal employees' NTLM hashes, a threat actor that is known for establishing initial access to organizations' computer systems and networks is using these attachments to steal employees’ hashes. Earlier this week, enterprise security firm Proofpoint published a report that suggested that the new attack chain "is capable of gathering sensitive information and facilitating follow-on activities." 

As reported by the company, at least two phishing campaigns have utilized this approach since February 26, 2024, when thousands of messages were distributed worldwide and hundreds of organizations were targeted. As an initial access broker (IAB), TA577 has previously been associated with Qbot and has been linked to Black Basta ransomware infections. 

The phishing waves spread thousands of messages around the world and targeted hundreds of organizations. The email security company Proofpoint reported today that although it has seen TA577 favouring Pikabot deployment in recent months, two recent attacks indicate that TA577 has taken a different approach to the attack. 

A group called TA578, which has been linked with the Qbot malware campaign and the Black Basta ransomware campaign, is one of the first access brokers. Recently, it has demonstrated an increasing interest in exploiting authentication protocols despite its previous inclination toward deploying Pikabot malware. 

NTLM hashes are a cornerstone of the security of Windows systems for authentication and session management. Attackers are extremely interested in these hashes as they are potentially useful in offline password cracking and in pass-the-hash attacks, which do not require actual passwords to gain access to services but instead use hashes as shortcuts. 

A technique known as thread hijacking, by which the attackers craft phishing emails that seem like legitimate follow-up emails to ongoing conversations, is used by the attackers. There is a malicious external server that is used to capture NTLM hashes, as these emails contain personalized ZIP files with HTML documents. When opened, these malicious servers start connecting to a malicious external server that has been set up specifically to capture these hashes. 

TA577 likely has the resources, time, and experience to iterate and test new delivery methods at the rate at which it adopts and distributes new tactics, techniques, and procedures (TTPs). TA577, along with other IABs, seems to be on top of the threat landscape and understands when and why certain attack chains cease to be effective. 

To increase the effectiveness and likelihood of victim engagement with their payload delivery and bypass detections, they will be able to create new methods to bypass detections and make use of them as quickly as possible. Researchers at Proofpoint have also noticed an increase in the use of file scheme URIs to direct recipients to external file shares such as SMB and WebDAV for the delivery of malware. To prevent exploits identified in this campaign, organizations should block outbound SMBs to prevent these sophisticated attacks. 

While restricting guest access to SMB servers is a simple security measure, it falls short of preventing these sophisticated attacks. The company advises that strict email filtering be implemented, outbound SMB connections should not be allowed, and Windows group policies should be activated to minimize the risk. 

To combat these types of NTLM-based threats effectively, Microsoft has introduced advanced security features into Windows 11 to help users. It is important to maintain constant vigilance and take strong security measures to prevent phishing attacks targeting the NTLM authentication protocol. For organizations to remain safe from sophisticated cybercriminal endeavours, they must stay abreast of emerging threats and adjust their defences to keep up with the rapidly evolving threats.

Rise in Fake Life Insurance Emails, Action Fraud Warns

 


Over the past few weeks, a surge in fraudulent emails impersonating reputable life insurance companies has prompted over 800 reports to Action Fraud, the UK’s national reporting centre for fraud and cybercrime. The scam emails are cleverly crafted to appear genuine, but they contain malicious links leading recipients to harmful websites designed to steal personal and financial information.

To help the public follow through this growing threat, Action Fraud has provided guidance on handling suspicious messages. Recipients are advised to independently verify the authenticity of an email by contacting the alleged sending organisation directly, using official contact details obtained from the organisation’s official website. This precaution is crucial, as scam emails often provide fake contact information that leads directly back to the fraudsters.

Action Fraud emphasises that legitimate banks and official sources will never request personal information via email, a tactic frequently employed by scammers to harvest sensitive data. To further combat these fraudulent activities, the public is encouraged to forward any suspicious emails to the Suspicious Email Reporting Service (SERS) at report@phishing.gov.uk. This service plays a pivotal role in the UK’s defence against the growing threat of email-based fraud, providing the government with a means to track and respond to these malicious activities.

In response to the increasing number of these incidents, it is essential for individuals to remain a step ahead and take proactive measures to protect themselves from falling victim to such scams. Understanding that fraudulent emails pose a significant threat, the public is urged to exercise caution and follow the provided guidance to verify the legitimacy of any communication from financial institutions or life insurance companies.

This warning comes as scammers continue to adapt and refine their tactics to exploit unsuspecting individuals. Action Fraud stresses the importance of public awareness and education to counter these evolving threats effectively. By disseminating this information through official channels, such as news blogs and other media outlets, the hope is to empower individuals with the knowledge needed to recognise and avoid falling prey to such scams.

As a responsible member of the online community, everyone has a role to play in staying informed and helping others stay safe from cyber threats. By adhering to the guidance provided by Action Fraud and reporting suspicious emails promptly, individuals can contribute to the collective effort to combat fraudulent activities and protect personal information from falling into the wrong hands.

Action Fraud's guidance provides a valuable resource for individuals to navigate these potential threats effectively, and the public is encouraged to remain vigilant and report any suspicious emails to contribute to the ongoing efforts against email-based fraud.



Uber's Costly Mistake: AUS$412,500 Fine for Spam Emails in Australia

 


There are many services offered by Uber Technologies, Inc., commonly known as Uber, which is a multinational company that offers a wide array of services, like ride-hailing, food delivery, and freight transportation, to its customers. 

Founded in California, the company is located in around 70 countries around the world, providing its services in over 10,500 cities around the globe, from its headquarters in San Francisco. On a global scale, Uber brings together more than 6 million active drivers and couriers daily, which gives the app an extremely high user base, with more than 131 million active users every month. 

The platform facilitates an estimated 25 million trips on a typical day, which is a record for the platform. The United States' largest ride-sharing company, Uber, has played a significant role in enabling a remarkable 42 billion trips since its establishment in 2010. Uber has also made a significant contribution to enabling a large share economy through opportunities such as the sharing economy. 

AFP reported that Uber was fined Aus$412,500 ($260,000) by Australian Communications and Media Authority (ACMA) for sending more than two million emails to customers in violation of anti-spam laws, as the company had violated anti-spam laws by sending over two million emails.  

There was a bulk email campaign distributed in January that marketed a new service that delivered alcohol to people at their homes. Furthermore, the company did not provide the option for customers to unsubscribe from the mailing list. Further, over 500,000 emails were sent to recipients who previously indicated that they did not want to receive marketing emails from us in the future. 

There are explicit laws in the Australian laws that prohibit companies from sending marketing emails without receiving the express consent of the recipient. Additionally, these laws require that the email recipients be provided with a clear option to unsubscribe from these mailings.

It has been noted that Nerida O'Loughlin, the chair of the ACMA, described Uber's actions as an 'avoidable error' and that the importance of respecting the preferences of customers cannot be overstated, given that customers are becoming increasingly frustrated when their requests are not met. 

As a response to these violations, Uber has apologized for sending these marketing emails, admitting that they had made an error in sending these emails. According to their apology, Uber acknowledged that they had made an error in this regard as well. 

According to ACMA reports, over the past 18 months, the total amount of penalties and fines paid by Australian businesses for violating spam and telemarketing laws has been over Aus$11 million. Accordingly, Uber has been fined an amount of Australian dollars 412,500 (equivalent to US dollars 260,000) in response to these violations. 

Notorious Global Phishing Platform Neutralized in Cross-Border Operation

 


There were arrests made of two alleged operators of the phishing-as-a-service platform "16shop" by INTERPOL in Indonesia and Japan after the agency carried out a successful investigation into the scheme, which was outsourced. 

A research project that investigated cyber threats in the ten-nation Association of Southeast Asian Nations (ASEAN) bloc revealed on Tuesday that 16shop, which the international police co-operation organization described as a vendor of "phishing kits" sold to cyber criminals, was able to detect its existence as part of the research project investigating cyber threats in the bloc. 

To defraud Internet users with email scams, the PaaS platform in use sells phishing kits to hackers to use to defraud them by sending an email with a pdf or a link that redirects the victim to a website that asks them for various personal information such as their credit card number. After these details have been stolen, they are used to steal money from victims by stealing their personal information. 

Known as phishing, this form of cyberattack is committed by impersonating a legitimate entity through a form of communication such as email, a phone call, or a text message, with the intent of obtaining sensitive information from the victim. Several cyber threats are prevalent around the world, including phishing. Up to 90 per cent of data breaches are thought to be attributable to successful phishing attacks, making it one of the most common ways to acquire credentials and steal data from victims. 

As reported by Interpol, 16shop sells phishing kits to hackers, whose aim is to covertly scam internet users with the help of these kits. In most cases, these scams involve sending emails that contain PDF files or links that redirect users to a website as the result of the sender's mistake. A site like this would then ask its victims for their credit card numbers or other sensitive information, such as Social Security numbers. 

A joint operation against 16Shop was carried out with the assistance of the cyber crime department of the INTERPOL General Secretariat, Indonesian authorities, Japanese authorities, and US authorities. Several private infosec firms participated in the conference, and these included the Japan Cyber Defense Institute, Singapore's Group-IB, Palo Alto Networks' Unit 42, and Trend Micro, as well as Cybertoolbelt, an investigation platform for cybercrime. 

Over 70,000 users in 43 countries have reportedly been compromised as a result of the hacking tools supplied by 16shop. In an interview with The Jakarta Post, brigadier general Adi Vivid Agustiadi Bachtiar, the director of the Indonesian National Police Cybercrime Investigation, stated that anyone can launch phishing attacks by simply clicking on their mouse. 

A cybercrime expert, Bernardo Pillot, said there has been an "unprecedented increase" in the sophistication and number of cyber threats as a result of cybercrime operations at Interpol. Moreover, of late there has been an increase in “customized” attacks as criminals are looking for the highest impact as well as the highest profit from their crimes. 

There is a strong indication that the platform is administrated from a country in Indonesia, according to law enforcement. They seized electronic items, as well as several luxury vehicles, during the arrest of a 21-year-old man. A couple of other platform facilitators were also arrested after the first arrest was made by law enforcement officers. 

A police investigation was launched by the National Police Agency of Japan and the Indonesian National Police shortly after the successful apprehension of the administrator which led to the identification of two facilitators and their arrest by both agencies. 

Group-IB, a Singaporean infosec outfit, had analyzed 16Shop, the e-commerce platform for phishing kits, and the outfit was able to assert that over 150,000 phishing domains had been created as a result of using the outfit's kits. Information security firm Earthlink believes that the kits in question have been traded on the underground cybercriminal market since as far back as November 2017, at prices ranging from $60 up to $150 for each kit. 

According to the group, phishing pages targeting the users of American Express were offered for $60, and fake Amazon pages mocking Amazon were offered for $150, which are both targeted at American Express users, respectively. With the help of the kits, putative victims were able to see content localized to their location based on eight languages. 

It was necessary to have global collaboration since many of the operations of the phishing-as-a-service vendor were hosted on servers owned and run by a US-based company to operate efficiently. To provide Indonesian investigators with the information they needed, the FBI helped to secure it.