Imperva has discovered a phishing kit that is hosted separately from the phishing websites.
Imperva said that, unlike previously available phishing kits, this new approach lives in the cloud, relies on hackers exploiting other hackers, and never goes away. The company's director of security strategy Rob Rachwald, explained that in traditional schemes when you take down a server, you take down not only the web page, but the back-end data collection capability comes offline.
“In this cloud version, data collection is hosted separately from the phishing web sites which means hackers only need to repost the web front-end in a new location to be back in business.
Also, and perhaps what's more interesting, this attack highlights that there's no honour among thieves. Two master hackers wrote and then posted a phishing kit into hacker forums,” he said.
“The irony is that anyone using this kit becomes an unknowing member of the master hacker's army. When hackers use this kit and deploy a successful phishing campaign, all the stolen credentials and information goes straight back to the master hacker without the proxy hacker's knowledge. It's very clever. The master hacker never needs to conduct a campaign to see financial gain.”
The kit was developed in Algeria with Arabic tutorials, while the kit itself is in English. Once logged on via ‘Login Spoofer' you select which pages you want to spoof from a selection of pages including webmail, PayPal and Facebook messages.
The user then has a dashboard which shows the victims. Imperva detected that the proxy hackers will see some success with dozens to hundreds of credentials potentially stolen before their fake sites are shut down. After this, the ‘master hacker' leverages a back door in the kit to harvest all the credentials the proxy hackers managed to obtain.
“Since new people create new phishing sites every day, with new campaigns the master hacker's numbers just grow and grow and grow,” said Rachwald.
See original article on scmagazineus.com
Imperva discovers phishing kit hosted in the cloud
Phishing tactic uses proxy hackers to harvest hundreds of thousands of credentials.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers

Wasabi Reveals Hidden Costs and Cloud Storage Shifts in ANZ for 2025

Datacom + Microsoft Azure: Turn Ideas Into Impact in Just 4 Weeks

Protect APIs. Protect Your Business.

KnowBe4 Benchmark Report: Reducing Human Risk & Phishing Vulnerability in ANZ

Modern Identity for SAP and Beyond: Replace SAP IDM with Saviynt