Phishers duck researchers with filtered victim lists

Powered by SC Magazine
 

Bouncer list phishing redirects outsiders to 404 pages.

Fraudsters are experimenting with a new type of phishing kit capable of restricting certain users from reaching exploit pages in a bid to keep researchers of their scent.

RSA's FraudAction Research Lab expert Limor Kessem said the bouncer kit allows attackers to filter victims by email addresses.

“The bouncer phishing kit targets a preset email list for each campaign. A user ID value is generated for the targeted recipients, sending them a unique URL for access to the attack,” Kessem said.

Those not on the email list – particularly, researchers who might impede the operation – are redirected to a page with the “404 page not found” error message.

For those unlucky enough to be on the list, the phishing kit is coded to copy specific files to a temporary folder, and to redirect victims to another page designed to prompt the user to enter login credentials.

"[T]raditional phishers like to cast as wide of a net as possible, but with this tactic the phisher is laser-focusing the campaign in an effort to collect only the most pertinent credentials for his purposes," he said.

"Keeping out uninvited guests also means avoiding security companies and prompt take-downs of such attacks."

RSA found that each phishing kit targeted an average of 3000 users, which included a mix of webmail users and corporate email addresses, including those of bank employees.

The kits also exploit zero-day vulnerabilities in plug-ins used on blogging sites, like WordPress, in order to compromise and hijack users' web pages to distribute malware.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Phishers duck researchers with filtered victim lists
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 309

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote