Attacks/Breaches
1/15/2013
10:13 PM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

New 'Bouncer List' Exploits Turn Phishing Into Clubbing

Targeted email attacks mirror your favorite night club; if you're not on the list, then you don't get in

In the old days, phishing worked like spam -- the more users it hit, the more successful it was considered to be. But a new attack concept uncovered this week turns fraudulent email attacks in the opposite direction.

A new, laser-targeted form of spear-phishing is the subject of a blog posted Tuesday by security researchers at RSA.

The new attack is called "bouncer list phishing" because it works like the bouncers at your favorite night club -- if users are not on the list, then they don't get phished.

"The bouncer phishing kit targets a preset email list for each campaign," the blog explains. "A user ID value is generated for the targeted recipients, sending them a unique URL for access to the attack. Here's the interesting part – much like a night club's bouncer list – any outsider attempting to access the phishing page is redirected to a '404 page not found' error message." RSA compares the attack to a "black hat whitelist."

"When victims access the phishing link, their name has to be on the list and their 'ID' value is verified on the fly as soon as they attempt to browse to the URL," the blog states. "After a scan of the "bouncer list," unintended visitors are stirred away from the phishing page; in fact, the page is not even generated for eyes it was not meant for.

"As for validated users -- the less fortunate that are let in -- the kit immediately generates an attack page, creating it on the very same hijacked website," the blog continues. "The kit's code is programmed to copy pertinent files into a temporary new folder and send victims to that page in order to steal their credentials.

"After the kit collects victim credentials, it sends them to yet another hijacked website -- taken over using the exact same method of vulnerability exploit and web-shell -- where the password-protected attack page lies in wait to steal user credentials," the blog explains.

The attack is a complete reversal of traditional phishing attacks designed to infect as many users as possible, the blog observes. "...the phisher is laser-focusing the campaign in an effort to collect only the most pertinent credentials for his purposes," RSA states. "Keeping out uninvited guests also means avoiding security companies and prompt takedowns of such attacks."

The highly targeted approach is likely the work of a gang or a fraud service vendor supplying credentials to specific geographical regions and targets, RSA postulates.

Scott Greaux, vice president of product management and services at anti-phishing service PhishMe, doesn't expect the new tactic to make a huge impact on enterprises.

"While phishing kits are an interesting technology, they are more consumer-focused in nature, and I don't expect to see them incorporated by the types of APT attacks that we've seen targeted at large organizations," Greaux says. "Phishing kits are not personalized and thus don't employ what we've found to be the most effective weapon a phishing email can use: personal details that make it appear genuine.

"However, the increased sophistication and prevalence of phishing kits underscore the need to train employees to recognize all types of phishing emails," Greaux states. "A savvy user will be able to recognize the signs of a suspicious email -- regardless of whether it's from a phishing kit or is a traditional spear phish -- and react appropriately."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.