All your phish are belong to me

Today I got a ‘Anti-virus notification message’ from our mail server (protected by kav4lms) so naturally I was interested in what the content was. Examining the quarantined mail on the server revealed some interesting details starting from the mail header itself:

“X-PHP-Script: .com/templates/beez/woolf2.php for 41.248.

The message had come from a compromised host and a php mailer was used
directly from there to send phishing mails.

A quick trip to the location mentioned in the header showed a mass mailer GUI containing a link to a spammer site which is currently offline. But a little digging around showed the site had been hosting ‘phish kits’ – collections of malicious files which can be downloaded ‘for free’.

All your phish are belong to me
These ‘phish kits’ are archives which just need to be extracted to a compromised server. All a cybercriminal needs to do (apart from finding a compromised server) is edit one of the files in that package and input a mail address where harvested information should be sent to. The twist is – not only does the information get sent to the designated email address, but to another cybercriminal as well.

This scam is nothing new, but less experienced bad guys might not realize that they’re sharing their ill-gotten gains with other, more technically savvy, blackhats.

All your phish are belong to me

Your email address will not be published. Required fields are marked *



How to catch a wild triangle

How Kaspersky researchers obtained all stages of the Operation Triangulation campaign targeting iPhones and iPads, including zero-day exploits, validators, TriangleDB implant and additional modules.

Subscribe to our weekly e-mails

The hottest research right in your inbox