Incidents

All your phish are belong to me

Today I got a ‘Anti-virus notification message’ from our mail server (protected by kav4lms) so naturally I was interested in what the content was. Examining the quarantined mail on the server revealed some interesting details starting from the mail header itself:

“X-PHP-Script: .com/templates/beez/woolf2.php for 41.248.

The message had come from a compromised host and a php mailer was used
directly from there to send phishing mails.

A quick trip to the location mentioned in the header showed a mass mailer GUI containing a link to a spammer site which is currently offline. But a little digging around showed the site had been hosting ‘phish kits’ – collections of malicious files which can be downloaded ‘for free’.

All your phish are belong to me
These ‘phish kits’ are archives which just need to be extracted to a compromised server. All a cybercriminal needs to do (apart from finding a compromised server) is edit one of the files in that package and input a mail address where harvested information should be sent to. The twist is – not only does the information get sent to the designated email address, but to another cybercriminal as well.

This scam is nothing new, but less experienced bad guys might not realize that they’re sharing their ill-gotten gains with other, more technically savvy, blackhats.

All your phish are belong to me

Your email address will not be published. Required fields are marked *

 

Reports

BlindEagle flying high in Latin America

Kaspersky shares insights into the activity and TTPs of the BlindEagle APT, which targets organizations and individuals in Colombia, Ecuador, Chile, Panama and other Latin American countries.

APT trends report Q2 2024

The report features the most significant developments relating to APT groups in Q2 2024, including the new backdoor in Linux utility XZ, a new RAT called SalmonQT, and hacktivist activity.

Subscribe to our weekly e-mails

The hottest research right in your inbox