Attacks/Breaches
1/15/2013
10:13 PM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

New 'Bouncer List' Exploits Turn Phishing Into Clubbing

Targeted email attacks mirror your favorite night club; if you're not on the list, then you don't get in

In the old days, phishing worked like spam -- the more users it hit, the more successful it was considered to be. But a new attack concept uncovered this week turns fraudulent email attacks in the opposite direction.

A new, laser-targeted form of spear-phishing is the subject of a blog posted Tuesday by security researchers at RSA.

The new attack is called "bouncer list phishing" because it works like the bouncers at your favorite night club -- if users are not on the list, then they don't get phished.

"The bouncer phishing kit targets a preset email list for each campaign," the blog explains. "A user ID value is generated for the targeted recipients, sending them a unique URL for access to the attack. Here's the interesting part – much like a night club's bouncer list – any outsider attempting to access the phishing page is redirected to a '404 page not found' error message." RSA compares the attack to a "black hat whitelist."

"When victims access the phishing link, their name has to be on the list and their 'ID' value is verified on the fly as soon as they attempt to browse to the URL," the blog states. "After a scan of the "bouncer list," unintended visitors are stirred away from the phishing page; in fact, the page is not even generated for eyes it was not meant for.

"As for validated users -- the less fortunate that are let in -- the kit immediately generates an attack page, creating it on the very same hijacked website," the blog continues. "The kit's code is programmed to copy pertinent files into a temporary new folder and send victims to that page in order to steal their credentials.

"After the kit collects victim credentials, it sends them to yet another hijacked website -- taken over using the exact same method of vulnerability exploit and web-shell -- where the password-protected attack page lies in wait to steal user credentials," the blog explains.

The attack is a complete reversal of traditional phishing attacks designed to infect as many users as possible, the blog observes. "...the phisher is laser-focusing the campaign in an effort to collect only the most pertinent credentials for his purposes," RSA states. "Keeping out uninvited guests also means avoiding security companies and prompt takedowns of such attacks."

The highly targeted approach is likely the work of a gang or a fraud service vendor supplying credentials to specific geographical regions and targets, RSA postulates.

Scott Greaux, vice president of product management and services at anti-phishing service PhishMe, doesn't expect the new tactic to make a huge impact on enterprises.

"While phishing kits are an interesting technology, they are more consumer-focused in nature, and I don't expect to see them incorporated by the types of APT attacks that we've seen targeted at large organizations," Greaux says. "Phishing kits are not personalized and thus don't employ what we've found to be the most effective weapon a phishing email can use: personal details that make it appear genuine.

"However, the increased sophistication and prevalence of phishing kits underscore the need to train employees to recognize all types of phishing emails," Greaux states. "A savvy user will be able to recognize the signs of a suspicious email -- regardless of whether it's from a phishing kit or is a traditional spear phish -- and react appropriately."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.