Rewterz Threat Alert – Phishers Create Fake Sites as Bait for Holiday Shopping Deals
November 27, 2019Rewterz Threat Alert – Lazarus DTrack – IOC’s
November 28, 2019Rewterz Threat Alert – Phishers Create Fake Sites as Bait for Holiday Shopping Deals
November 27, 2019Rewterz Threat Alert – Lazarus DTrack – IOC’s
November 28, 2019Severity
Medium
Analysis Summary
While reports of web skimmers have become fairly common over the last year or so, every so often there is a twist. A report from Malwarebytes Labs looks at the activities of a group who not only carry out skimming attacks, but also use phishing pages crafted to resemble those of payment service platforms to obtain credentials. The skimmer code is injected into web pages using the file “ga.js” which is crafted to appear as a Google Analytics library. The sample analyzed in the report is almost identical to the legitimate page with the only giveaway being the domain name involved. Once a victim enters their data into the fraudulent page, they will be redirected to the legitimate page and even have the correct payment amount inserted into the page.
Impact
Financial loss
Indicators of Compromise
IP
- 124[.]156[.]34[.]157
- 47[.]245[.]55[.]198
- 5[.]53[.]124[.]235
URL
- payment-mastercard[.]com
- google-query[.]com
- google-analytics[.]top
- google-smart[.]com
- google-payment[.]com
- jquery-assets[.]com
- sagepay-live[.]com
- google-query[.]com
- payment-sagepay[.]com
- payment-worldpay[.]com
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.