Rewterz Threat Alert – Heatstroke Phishing Campaign

Wednesday, September 11, 2019

Severity

Medium

Analysis Summary

A new multistage phishing attack dubbed “Heatstroke” and how it may differ from other phishing campaigns. The attackers apparently do research on their potential victims and instead of targeting their work email addresses, the victim’s private email addresses are targeted. Trend Micro indicated that these may have come from the victim’s own address list. Personal email addresses are more likely to be hosted on free email providers and may have a more lax security configuration than an organization’s mail servers. Thus the phishing emails are more likely to reach their target. If for instance, a Gmail victim falls prey to their scheme, the attackers may gain access not only to the victim’s email account, but potentially their Google Drive and associated Android devices as well. The landing page presented to the victim, should they follow the link provided in the phishing email, presents a multi-page website, where the credentials are not requested immediately. The victim has to traverse a few pages before the credential request is shown. This could potentially be an attempt to lull the victim into thinking this is a legitimate site. The landing page is written in PHP and has the ability to return a 404 (not found error code) should the victim be connecting in from a country, domain or IP address, the attackers have black listed. The attack is based on a phishing kit that is offered as a service. Trend Micro indicated that they saw another group purchase the kit while they were doing research on Heatstroke. The stolen credentials are sent back to the attackers, via email, with the data hidden using steganography techniques.

Impact

Credential theft

Indicators of Compromise

URLs

http[:]//2m[.]ma/ar/
https[:]//alphawolfden[.]com/[.]well-known/
https[:]//posicionamientowebeconomico[.]es/wp-includes/
http[:]//raisingtwo[.]com/INC/

Malware Hash (MD5/SHA1/SH256)

587368b3f679083010690cbc15df647a045f62f02ca86495d704d24fdb2eb5d6

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.

Data Sheets

Corporate Brochure


Our Story


Services


Solutions


Managed Security


Upcoming Rewterz Trainings/Events

Rewterz News

  • 17, September 2019 Rewterz Threat Alert – Emotet Revival with Spam Emails Around the World
  • 17, September 2019 Rewterz Threat Advisory – CVE-2016-1409 – Cisco Products IPv6 Neighbor Discovery Crafted Packet Vulnerability
  • 17, September 2019 Rewterz Threat Alert – Phishing Attack Targets The Guardian’s Whistleblowing Site
  • 16, September 2019 Rewterz Threat Alert – InnfiRAT Malware Steals Litecoin And Bitcoin Wallet Information

Copyright © Rewterz. All rights reserved.