Feeds

Phishing coders hook clueless crooks

No honour among Web 2.0 thieves

Internet Security Threat Report 2014

Cheapskate fraudsters hoping to run phishing scams for peanuts have themselves been hoodwinked. Security watchers have spotted a free phishing kit containing a hidden backdoor that siphons off stolen credentials from the fraudsters who use the technology.

Script kiddies are unlikely to twig that captured credit card numbers are being shared with the coders who developed the phishing kit, a recurrent group of Moroccan fraudsters calling themselves Mr-Brain.

Mr-Brain's website offers easy-to-use phishing site code, email templates and other hacking tools. The website offers phishing kits for many of the most common targets including Bank of America, eBay, PayPal and HSBC.

Only a basic knowledge of PHP coding is required to set up the kits, which fraudsters can have up and running in minutes. Trouble is that as well as sending victims' login credentials to the fraudsters' chosen email address, the data is also surreptitiously sent to the Mr-Brain crew, Netcraft reports. The techniques used by the coders are quite sophisticated.

"The configuration script exploits the case-sensitivity in PHP variable names to disguise Mr-Brain’s electronic mail address as an unrelated but seemingly essential part of the script, encouraging fraudsters not to alter it," Netcraft explains.

"The injected electronic mail address is actually contained in a completely separate PHP file, where it is encrypted in a hidden input field named 'niarB', or 'Brain' backwards. Yet another PHP script reads the value from this input field and decrypts it before supplying it to the configuration script. Most fraudsters are unlikely to notice this level of obfuscation and will assume the script is working normally, as they will also receive a copy of any emails produced by the script."

In this way Mr-Brain receives stolen credentials via a Gmail account. Another Gmail account was used in a similar scam involving a phishing kit (again featuring hidden backdoor code) and targeting Bank of America that surfaced earlier this month, Netcraft adds. The firm has added detection for pages generated by the toolkit to its anti-phishing toolbar. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.