Attacks/Breaches
7/30/2008
06:58 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Phishing Kits Widely Compromised To Steal From Phishers

From 21 different distribution sites, the authors of the Usenix Conference paper identified 379 distinct phishing kits, 129 of which contained back doors.

Would-be phishers can buy, or obtain for free, phishing kits, which include the files necessary to duplicate a targeted Web site and scripts to steal information submitted by phishing victims. They're widely available online, but they're also untrustworthy.

In January, Netcraft security researcher Paul Mutton identified a phishing tool kit distributed by a group of Moroccan cybercriminals that had been compromised with a back door. Unbeknownst to its users, the phishing kit sent copies of stolen information to its creators.

Now it turns out that more than 40% of the live phishing kits found online (61 out of 150) have back doors designed to steal from the information thieves using them.

In a paper presented on Monday at the Usenix Conference in San Jose, Calif. -- "There Is No Free Phish: An Analysis Of 'Free' And Live Phishing Kits" -- security researchers Marco Cova, Christopher Kruegel, and Giovanni Vigna from the University of California, Santa Barbara, have found that the big phishers -- the authors of phishing kits -- feed on the little phishers who deploy phishing kits.

And there are a surprising number of phishing tool kits. From 21 different distribution sites, the authors of the paper identified 379 distinct phishing kits, 129 of which contained back doors.

The phishing kits targeted 49 different organizations, mainly banks and auction sites, but also e-mail providers and gaming portals. Among the kits downloaded from distribution sites, the five most common targets were Bank of America (21 kits), eBay (19), Wachovia (18), HSBC (18), and PayPal (15).

Most of the live backdoor phishing kits send hijacked information to e-mail drop accounts. Two of the kits stored hijacked information in a file on the phishing site server, and one sent the information to an outside server using a POST request.

And in an attempt to conceal the true nature of their software, phishing kit authors frequently obfuscate their code and include comments in their code designed to discourage modifications that might close their secret back door.

However, comments like "Don't need to change anything here" do more to invite suspicion than to allay it.

"In other cases, comments sound outright sarcastic," the paper said. "In one instance, the indexes of the array used in a permutation-based obfuscation read 'good for your scam.'"

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.