09 June 2022

LET'S GO PHISHING: More than "Catch-and-Release"...and Latest Articles via Bleeping Computer

Bill Toulas is a technology writer and infosec news reporter with over a decade of experience working on various online publications. An open source advocate and Linux enthusiast, is currently finding pleasure in following hacks, malware campaigns, and data breach incidents, as well as by exploring the intricate ways through which tech is swiftly transforming our lives
 

Massive Facebook Messenger phishing operation generates millions

"Researchers have uncovered a large-scale phishing operation that abused Facebook and Messenger to lure millions of users to phishing pages, tricking them into entering their account credentials and seeing advertisements.

The campaign operators used these stolen accounts to send further phishing messages to their friends, generating significant revenue via online advertising commissions.

According to PIXM, a New York-based AI-focused cybersecurity firm, the campaign peaked in April-May 2022 but has been active since at least September 2021.

PIXM was able to trace the threat actor and map the campaign due to one of the identified phishing pages hosting a link to a traffic monitoring app (whos.amung.us) that was publicly accessible without authentication. . . 

Massive scale of abuse

While it is unknown how the campaign initially started, PIXM states victims arrived at phishing landing pages from a series of redirects originating from Facebook Messenger.

As more Facebook accounts were stolen, the threat actors used automated tools to send further phishing links to the compromised account's friends, creating massive growth in stolen accounts.

"A user's account would be compromised and, in a likely automated fashion, the threat actor would log in to that account and send out the link to the user's friends via Facebook Messenger," explains PIXM in the report.

While Facebook has protection measures to stop the dissemination of phishing URLs, the threat actors used a trick to bypass these protections.

The phishing messages used legitimate URL generation services such as litch.me, famous.co, amaze.co, and funnel-preview.com, which would be a problem to block as legitimate apps use them.

Some of the URLs used in the phishing campaign
Some of the URLs used in the phishing campaign (PIXM)

After discovering that they could gain unauthenticated access to the phishing campaign stats pages, the researchers found that in 2021, 2.7 million users had visited one of the phishing portals. This figure went up to 8.5 million in 2022, reflecting the massive growth of the campaign.

Snap from the dashboard of the analytics service
Snap from the dashboard of the exposed analytics service (PIXM)

By diving deeper, the researchers identified 405 unique usernames used as campaign identifiers, each having a separate Facebook phishing page. These phishing pages had page views ranging from only 4,000 views to some in the millions, with one as high as 6 million page views.

Sample of the identified disemination users
Sample of the identified dissemination users (PIXM)

The researchers believe that these 405 usernames represent only a fraction of the accounts used for the campaign.

After the victim enters their credentials on the phishing landing page, a new round of redirections begins, taking them to advertising pages, survey forms, etc.

One of the ads the phised users end up on
One of the ads showed to phished users (PIXM)

The threat actors receive referral revenue from these redirects, which are estimated to be millions of USD at this scale of operation.

Tracing the threat actor

PIXM found a common code snippet on all landing pages, which contained a reference to a website that has been seized and constitutes part of an investigation against a Colombian man identified as Rafael Dorado.

Website belonging to the campaign operator
Website belonging to the campaign operator

It is unclear who seized the domain and placed the notice on the site.

A reverse whois lookup revealed links to a legitimate web development company in Colombia and old sites offering Facebook "like bots" and hacking services.

PIXM shared the results of its investigation with the Colombian Police and Interpol, but as they note, the campaign is still ongoing, even though many of the identified URLs have gone offline."

Related Articles:

Qbot malware now uses Windows MSDT zero-day in phishing attacks

Windows zero-day exploited in US local govt phishing attacks

Evasive phishing mixes reverse tunnels and URL shortening services

Fake antivirus updates used to deploy Cobalt Strike in Ukraine

Bored Ape Yacht Club, Otherside NFTs stolen in Discord server hack

BLEEPING COMPUTER LATEST ARTICLES >> https://www.bleepingcomputer.com/ 

 

 

No comments: