On the International Safer Internet Day we could not fail to mention one of the most common practices of cybercriminals. There are countless phishing campaigns that come to light every day. Module 6 of C1b3rWall Academy is packed with interesting lectures, such as the one given by Nuria Prieto, Security Analyst at the CERT of the University Carlos III of Madrid. Her lecture entitled “Los #malosmalotes no descansan” aims to illustrate some of the phishing campaigns that have taken place in recent years.
Phishing is the main entry vector, as humans cannot hide themselves. We must think that the attackers are there and always be on guard.
If analyzing phishing URLs, it is important to know what we are doing. It is advisable to do it on virtual machines (or an old computer), protected environments, never use our service provider as an exit, etc. The best way to hide is to use the TOR network and a VPN is never a bad idea.
Analyzing phishing campaigns
Multanopagada and saludcastillayleons were some of the analyzed URLs, (Multanopagada) received on March 14, 2021. The worrying thing is that they were Spanish domains, and to register a domain in Spain, the Tax ID must be provided. The site from which the malware has been downloaded was also Spanish. The corresponding bodies were notified.
As of April 5, the domains were still online. The attackers were not very careful as they did not even camouflage the URL. They used either purchased (VPS) or Azure (free) machines. The URL came encoded in base 64, which usually includes the victim’s email address. If the victim wishes to access it, they can decode it, view the information, modify it and re-encode it. However, never do this by yourself as your data would stay there.
Paypal
Another campaign was a very good copy of Paypal in which the attackers told the victims that there was a problem with their account and asked us for credit card, address, phone number and even a photo of their ID card. They collected this data for future campaigns. Luckily, the FBI was investigating this case.
FarmaUtils
It distributed malware files looking for vulnerable data, such as the victims’ medical history or social security number. The domain was registered with sedoparking. This means that attackers show interest in some domains that are gaining good fame and reputation, and if they ever become free, sedoparking notifies them if they have shown interest. They acquire the domain and use it for other purposes.
As Nuria says, cybercriminals do not take breaks, and they need little investment and minimal effort to commit their crimes. Although they are difficult to prosecute, we can make it more difficult for them by using our knowledge and taking timely actions.
These are some of the most known cases. You can learn about other cases from Nuria’s conference, here is the link to it. You can also read the full article on News 365.