{"id":16217,"date":"2019-09-03T08:10:03","date_gmt":"2019-09-03T16:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/03\/news-9959\/"},"modified":"2019-09-03T08:10:03","modified_gmt":"2019-09-03T16:10:03","slug":"news-9959","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/03\/news-9959\/","title":{"rendered":"New social engineering toolkit draws inspiration from previous web campaigns"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 03 Sep 2019 15:15:33 +0000<\/strong><\/p>\n<p>Some of the most common web threats we track have a social engineering component. Perhaps the more popular ones are those encountered via <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/06\/truth-in-malvertising-how-to-beat-bad-ads\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"malvertising (opens in a new tab)\">malvertising<\/a>, or hacked websites that push fraudulent updates.<\/p>\n<p>We recently identified a website compromise with a scheme we had not seen before; it&#8217;s part of a campaign using a <a rel=\"noreferrer noopener\" aria-label=\"social engineering (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\">social engineering<\/a> toolkit that has drawn over 100,000 visits in the past few weeks.<\/p>\n<p>The toolkit, which we dub Domen, is built around a detailed client-side script that acts as a framework for different fake update templates, customized for both desktop and mobile users in up to 30 languages.<\/p>\n<p>Loaded as an iframe from compromised websites (most of them running WordPress) and displayed over top as an additional layer, it entices victims to install so-called updates that instead download the NetSupport remote administration tool. In this blog we describe its tactics, techniques, and procedures (TTPs) that remind us of some past and current social engineering campaigns.<\/p>\n<h3>Fake Flash Player update<\/h3>\n<p>The premise looks typical of many other social engineering toolkit templates we&#8217;ve come across before. Here, users are tricked into downloading and running a Flash Player update:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40237\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/fakeflashlanding\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding.png\" data-orig-size=\"822,471\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fakeflashlanding\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding-300x172.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding-600x344.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding.png\" alt=\"\" class=\"wp-image-40237\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding.png 822w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding-300x172.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeflashlanding-600x344.png 600w\" sizes=\"(max-width: 822px) 100vw, 822px\" \/><\/a><figcaption>Figure 1: Fake Flash Player update notification<\/figcaption><\/figure>\n<p>Note that the domain wheelslist[.]net belongs to a legitimate website that has been hacked and where an iframe from chrom-update[.]online is placed as a layer above the normal page:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40206\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/deobfuscated-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated.png\" data-orig-size=\"643,238\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"deobfuscated\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated-300x111.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated-600x222.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated.png\" alt=\"\" class=\"wp-image-40206\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated.png 643w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated-300x111.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/deobfuscated-600x222.png 600w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/a><figcaption>Figure 2: Deobfuscated code found on compromised site that loads malicious iframe<\/figcaption><\/figure>\n<p>Clicking the UPDATE or LATER button downloads a file called &#8216;download.hta&#8217;, indexed on Atlassian&#8217;s Bitbucket platform and hosted on an Amazon server (bbuseruploads.s3.amazonaws.com):<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40202\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/bitbucket\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket.png\" data-orig-size=\"1049,354\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bitbucket\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket-300x101.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket-600x202.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket.png\" alt=\"\" class=\"wp-image-40202\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket.png 1049w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket-300x101.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/bitbucket-600x202.png 600w\" sizes=\"(max-width: 1049px) 100vw, 1049px\" \/><\/a><figcaption>Figure 3: Bitbucket project from user &#8216;Garik&#8217;<\/figcaption><\/figure>\n<p>Upon execution, that HTA script will run PowerShell and connect to xyxyxyxyxy[.]xyz in order to retrieve a malware payload.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40203\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/hta_view\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view.png\" data-orig-size=\"652,782\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hta_view\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view-250x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view-500x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view.png\" alt=\"\" class=\"wp-image-40203\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view.png 652w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view-250x300.png 250w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/hta_view-500x600.png 500w\" sizes=\"(max-width: 652px) 100vw, 652px\" \/><\/a><figcaption>Figure 4: Malicious mshta script retrieves payload from external domain<\/figcaption><\/figure>\n<p>That payload is a package that contains the NetSupport RAT:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40240\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/processes-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes.png\" data-orig-size=\"538,242\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"processes\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes-300x135.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes.png\" alt=\"\" class=\"wp-image-40240\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes.png 538w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/processes-300x135.png 300w\" sizes=\"(max-width: 538px) 100vw, 538px\" \/><\/a><figcaption>Figure 5: Process tree showing execution flow<\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40241\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/traffic_netsupport\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport.png\" data-orig-size=\"691,124\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_netsupport\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport-300x54.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport-600x108.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport.png\" alt=\"\" class=\"wp-image-40241\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport.png 691w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport-300x54.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_netsupport-600x108.png 600w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/a><figcaption>Figure 6: Observed HTTP traffic confirming NetSupport RAT infection<\/figcaption><\/figure>\n<h3>Link with &#8220;FakeUpdates&#8221; aka SocGholish <\/h3>\n<p>In late 2018, we documented a malicious redirection campaign that we dubbed FakeUpdates, also known as SocGholish based on a <a href=\"https:\/\/www.proofpoint.com\/us\/daily-ruleset-update-summary-20180503\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ruleset from EmergingThreats<\/a>. It leverages compromised websites and performs some of the most creative fingerprinting checks we&#8217;ve seen, before delivering its payload (NetSupport RAT).<\/p>\n<p>We recently noticed a <a rel=\"noreferrer noopener\" aria-label=\"tweet (opens in a new tab)\" href=\"https:\/\/twitter.com\/Born_Dead_1\/status\/1163545105816530944?s=20\" target=\"_blank\">tweet<\/a> that reported SocGholish via the compromised site fistfuloftalent[.]com, although the linked <a rel=\"noreferrer noopener\" aria-label=\"sandbox report (opens in a new tab)\" href=\"https:\/\/app.any.run\/tasks\/64bd7dd9-d79b-4244-a2b7-3547ee9fa2b3\/\" target=\"_blank\">sandbox report<\/a> shows the same template we described earlier, which is different than the SocGholish one: <\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_.png\" data-rel=\"lightbox-6\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40201\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/fontpack_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_.png\" data-orig-size=\"667,843\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fontpack_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_-237x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_-475x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_.png\" alt=\"\" class=\"wp-image-40201\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_.png 667w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_-237x300.png 237w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack_-475x600.png 475w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/a><figcaption>Figure 7: New theme erroneously associated with SocGholish<\/figcaption><\/figure>\n<p>The reason why the sandbox is flagging SocGholish is because the compromised site contains artifacts related to it, and does, in some circumstances, actually redirect to it:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_.png\" data-rel=\"lightbox-7\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40200\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/fakeupdates_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_.png\" data-orig-size=\"667,959\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fakeupdates_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_-209x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_-417x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_.png\" alt=\"\" class=\"wp-image-40200\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_.png 667w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_-209x300.png 209w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fakeupdates_-417x600.png 417w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/a><figcaption>Figure 8: SocGholish template<\/figcaption><\/figure>\n<p>This hacked site actually hosts two different campaigns and based on some browser and network fingerprinting, you might be served one or the other. This can be confirmed by looking at the injected code in two different pieces of JavaScript, the first one being flagged by the EmergingThreats ruleset.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns.png\" data-rel=\"lightbox-8\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40205\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/comparison_campaigns\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns.png\" data-orig-size=\"715,691\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"comparison_campaigns\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns-300x290.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns-600x580.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns.png\" alt=\"\" class=\"wp-image-40205\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns.png 715w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns-300x290.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/comparison_campaigns-600x580.png 600w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/a><figcaption>Figure 9: Comparing two campaigns by looking at the injected JavaScript<\/figcaption><\/figure>\n<p>Although the templates for SocGholish and the new campaign are different, they both:<\/p>\n<ul>\n<li>can occasionally be found on the same compromised host<\/li>\n<li>abuse or abused a cloud hosting platform (Bitbucket, <a rel=\"noreferrer noopener\" aria-label=\"Dropbox (opens in a new tab)\" href=\"https:\/\/isc.sans.edu\/forums\/diary\/Fake+Updates+campaign+still+active+in+2019\/24640\/\" target=\"_blank\">Dropbox<\/a>)<\/li>\n<li> download a fake update as &#8216;download.hta&#8217;<\/li>\n<li>deliver the <a rel=\"noreferrer noopener\" aria-label=\"NetSupport RAT (opens in a new tab)\" href=\"https:\/\/www.malware-traffic-analysis.net\/2019\/08\/26\/index.html\" target=\"_blank\">NetSupport RAT<\/a><\/li>\n<\/ul>\n<p>Side note: A publicly saved <a rel=\"noreferrer noopener\" href=\"https:\/\/www.virustotal.com\/graph\/g7ddf138a45194f579d965d3c0f80534f105633006a1f44e8a4683abffd00c57c\" target=\"_blank\">VirusTotal graph<\/a> (saved screenshot <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/VT_graph.png\" target=\"_blank\" data-rel=\"lightbox-9\" title=\"\">here<\/a>) shows that the threat actors also used DropBox at some point to host the netSupport RAT. They double compressed the file, first as zip and then as rar.<\/p>\n<p>Similarities with SocGholish could be simply due to the threat actor getting inspired by what has been done before. However, the fact that both templates deliver the same RAT is something noteworthy.<\/p>\n<h3>Link with EITest<\/h3>\n<p>At about the same time as we were reviewing this new redirection chain, we saw this other one <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/tkanalyst\/status\/1163084043832872961?s=20\" target=\"_blank\">identified by @tkanalyst<\/a> tagged as FontPack that is reminiscent of the HoeflerText social engineering toolkit <a rel=\"noreferrer noopener\" aria-label=\"reported by Proofpoint (opens in a new tab)\" href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme\" target=\"_blank\">reported by Proofpoint<\/a> in early 2017.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack.png\" data-rel=\"lightbox-10\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40209\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/fontpack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack.png\" data-orig-size=\"1375,953\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fontpack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack-300x208.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack-600x416.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack.png\" alt=\"\" class=\"wp-image-40209\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack.png 1375w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack-300x208.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/fontpack-600x416.png 600w\" sizes=\"(max-width: 1375px) 100vw, 1375px\" \/><\/a><figcaption>Figure 10: New &#8216;FontPack&#8217; soc. engineering schem<\/figcaption><\/figure>\n<p>Going back to the traffic capture we collected before, we immediately notice the same infrastructure that includes a JavaScript template (template.js) and a panel (.xyz domain):<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view.png\" data-rel=\"lightbox-11\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40281\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/traffic_view-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view.png\" data-orig-size=\"758,769\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_view\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view-296x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view-591x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view.png\" alt=\"\" class=\"wp-image-40281\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view.png 758w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view-296x300.png 296w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/traffic_view-591x600.png 591w\" sizes=\"(max-width: 758px) 100vw, 758px\" \/><\/a><figcaption> Figure 11: Web traffic reveals same artifacts used in fake Flash Player theme <\/figcaption><\/figure>\n<p>A closer look at the template.js file confirms they are practically identical except for a different payload URL and some unique identifiers:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts.png\" data-rel=\"lightbox-12\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40210\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/compare_scripts\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts.png\" data-orig-size=\"866,669\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"compare_scripts\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts-300x232.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts-600x464.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts.png\" alt=\"\" class=\"wp-image-40210\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts.png 866w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/compare_scripts-600x464.png 600w\" sizes=\"(max-width: 866px) 100vw, 866px\" \/><\/a><figcaption>Figure 12: Template.js is the social engineering framework<\/figcaption><\/figure>\n<h3>Domen social engineering kit<\/h3>\n<p>The template.js file is a beautiful piece of work that goes beyond fake fonts or Flash Player themes. While we initially detected this redirection snippet under the FontPack label, we decided to call this social engineering framework Domen, based on a string found within the code.<\/p>\n<p>The single JavaScript file controls a variety of templates depending on the browser, operating system, and locale. For instance, the same fake error message is translated into 30 different languages.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1.png\" data-rel=\"lightbox-13\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40260\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/_locales_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1.png\" data-orig-size=\"826,795\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"_locales_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1-300x289.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1-600x577.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1.png\" alt=\"\" class=\"wp-image-40260\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1.png 826w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1-300x289.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/locales_-1-600x577.png 600w\" sizes=\"(max-width: 826px) 100vw, 826px\" \/><\/a><figcaption>Figure 13: Customized templates based on operating system&#8217;s language <\/figcaption><\/figure>\n<p>One particular variable called &#8220;banner&#8221; sets the type of social engineering theme: <em>var banner = &#8216;2&#8217;; \/\/ 1 &#8211; Browser Update | 2 &#8211; Font | 3 &#8211; Flash<\/em><\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners.png\" data-rel=\"lightbox-14\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40259\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/banners\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners.png\" data-orig-size=\"985,696\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"banners\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners-300x212.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners-600x424.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners.png\" alt=\"\" class=\"wp-image-40259\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners.png 985w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners-300x212.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/banners-600x424.png 600w\" sizes=\"(max-width: 985px) 100vw, 985px\" \/><\/a><figcaption>Figure 14: Customized templates based on operator&#8217;s choice  <\/figcaption><\/figure>\n<p>We already documented the Flash Player one, while the Font (HoeflexText copycat) and some of its variations (<a rel=\"noreferrer noopener\" aria-label=\"Chrome (opens in a new tab)\" href=\"https:\/\/twitter.com\/nao_sec\/status\/1163086346761543682?s=20\" target=\"_blank\">Chrome<\/a>, <a rel=\"noreferrer noopener\" aria-label=\"Firefox (opens in a new tab)\" href=\"https:\/\/twitter.com\/killamjr\/status\/1163136754410377217?s=20\" target=\"_blank\">Firefox<\/a>) was also observed. Here&#8217;s the third one, which is a browser update: <\/p>\n<h4>Browser update<\/h4>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE.png\" data-rel=\"lightbox-15\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40246\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/browser_ie\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE.png\" data-orig-size=\"927,583\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browser_IE\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE-300x189.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE-600x377.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE.png\" alt=\"\" class=\"wp-image-40246\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE.png 927w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE-300x189.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_IE-600x377.png 600w\" sizes=\"(max-width: 927px) 100vw, 927px\" \/><\/a><figcaption>Figure 15: Internet Explorer template<\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome.png\" data-rel=\"lightbox-16\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40247\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/browser_chrome\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome.png\" data-orig-size=\"929,589\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browser_Chrome\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome-300x190.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome-600x380.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome.png\" alt=\"\" class=\"wp-image-40247\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome.png 929w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome-300x190.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Chrome-600x380.png 600w\" sizes=\"(max-width: 929px) 100vw, 929px\" \/><\/a><figcaption>Figure 16: Chrome template<\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF.png\" data-rel=\"lightbox-17\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40248\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/browser_ff\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF.png\" data-orig-size=\"927,587\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browser_FF\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF-300x190.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF-600x380.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF.png\" alt=\"\" class=\"wp-image-40248\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF.png 927w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF-300x190.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_FF-600x380.png 600w\" sizes=\"(max-width: 927px) 100vw, 927px\" \/><\/a><figcaption>Figure 17: Firefox template<\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge.png\" data-rel=\"lightbox-18\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40249\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/browser_edge\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge.png\" data-orig-size=\"835,645\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browser_Edge\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge-300x232.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge-600x463.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge.png\" alt=\"\" class=\"wp-image-40249\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge.png 835w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_Edge-600x463.png 600w\" sizes=\"(max-width: 835px) 100vw, 835px\" \/><\/a><figcaption>Figure 18: Edge template<\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown.png\" data-rel=\"lightbox-19\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40250\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/browser_unknown\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown.png\" data-orig-size=\"931,589\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browser_unknown\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown-300x190.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown-600x380.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown.png\" alt=\"\" class=\"wp-image-40250\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown.png 931w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown-300x190.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/browser_unknown-600x380.png 600w\" sizes=\"(max-width: 931px) 100vw, 931px\" \/><\/a><figcaption>Figure 19: Other browsers&#8217; template<\/figcaption><\/figure>\n<p>There is also a template for mobile devices (which again is translated into 30 languages) that instructs users how to download and run a (presumably malicious) APK:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk.png\" data-rel=\"lightbox-20\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40265\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/apk\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk.png\" data-orig-size=\"1067,339\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"apk\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk-300x95.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk-600x191.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk.png\" alt=\"\" class=\"wp-image-40265\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk.png 1067w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk-300x95.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/apk-600x191.png 600w\" sizes=\"(max-width: 1067px) 100vw, 1067px\" \/><\/a><figcaption>Figure 20: Instructions on how to install APK files for Android users<\/figcaption><\/figure>\n<h3>Scope and stats<\/h3>\n<p>The scope of this campaign remains unclear but it has been fairly active in the past few weeks. Every time a user visits a compromised site that has been injected with the Domen toolkit, communication takes place with a remote server hosted at asasasqwqq[.]xyz:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback.png\" data-rel=\"lightbox-21\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40261\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/panel_callback\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback.png\" data-orig-size=\"721,343\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"panel_callback\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback-300x143.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback-600x285.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback.png\" alt=\"\" class=\"wp-image-40261\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback.png 721w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback-300x143.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/panel_callback-600x285.png 600w\" sizes=\"(max-width: 721px) 100vw, 721px\" \/><\/a><figcaption>Figure 20: Connection to panel seen in template.js script<\/figcaption><\/figure>\n<p>The page will create a GET request that returns a number:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count.png\" data-rel=\"lightbox-22\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40263\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/count\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count.png\" data-orig-size=\"725,320\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"count\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count-300x132.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count-600x265.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count.png\" alt=\"\" class=\"wp-image-40263\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count.png 725w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count-600x265.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/count-195x85.png 195w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/a><figcaption>Figure 21: Network traffic showing number of visits<\/figcaption><\/figure>\n<p>If we trust those numbers (a subsequent visit increments it by 1), it means this particular campaign has received over 100,000 views in the past few weeks.<\/p>\n<p>Over time, we have seen a number of different social engineering schemes. For the most part, they are served dynamically based on a user&#8217;s geolocation and browser\/operating system type. This is common, for example, with tech support scam pages (browlocks) where the server will return the appropriate template for each victim.<\/p>\n<p>What makes the Domen toolkit unique is that it offers the same fingerprinting (browser, language) and choice of templates thanks to a client-side (template.js) script which can be tweaked by each threat actor. Additionally, the breadth of possible customizations is quite impressive since it covers a range of browsers, desktop, and mobile in about 30 different languages.<\/p>\n<h3>Protection<\/h3>\n<p>Malwarebytes users were already protected against this campaign thanks to our anti-exploit protection that thwarts the .hta attack before it can even retrieve its payload.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/blocked_.gif\" data-rel=\"lightbox-23\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40204\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/attachment\/blocked_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/blocked_.gif\" data-orig-size=\"690,554\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blocked_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/blocked_-300x241.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/blocked_-600x482.gif\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/blocked_.gif\" alt=\"\" class=\"wp-image-40204\" \/><\/a><\/figure>\n<p><em>Note: We shared a traffic capture with the folks at EmergingThreats who created a new set of <\/em><a rel=\"noreferrer noopener\" aria-label=\"rule (opens in a new tab)\" href=\"https:\/\/doc.emergingthreats.net\/bin\/view\/Main\/2027936\" target=\"_blank\"><em>rules<\/em><\/a><em> for it.<\/em><\/p>\n<h3>Indicators of compromise<\/h3>\n<p><strong>Domen social engineering kit<\/strong><\/p>\n<p>chrom-update[.]online<\/p>\n<p><strong>Malicious .HTA<\/strong><\/p>\n<p>bitbucket[.]org\/execuseme1\/1312\/downloads\/download.hta<\/p>\n<p><strong>NetSupport loader<\/strong><\/p>\n<p>xyxyxyxyxy[.]xyz\/wwwwqwe\/11223344.exe<br \/>mnmnmnmnmnmn[.]club\/qweeewwqe\/112233.exe<\/p>\n<p><strong>Panels<\/strong><\/p>\n<p>asasasqwqq[.]xyz<br \/>sygicstyle[.]xyz<br \/>drumbaseuk[.]com<\/p>\n<p><strong>NetSupport RAT<\/strong><\/p>\n<p>9c69a1d81133bc9d87f28856245fbd95bd0853a3cfd92dc3ed485b395e5f1ba0<br \/>58585d7b8d0563611664dccf79564ec1028af6abb8867526acaca714e1f8757d<br \/>b832dc81727832893d286decf50571cc740e8aead34badfdf1b05183d2127957<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/\">New social engineering toolkit draws inspiration from previous web campaigns<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 03 Sep 2019 15:15:33 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/' title='New social engineering toolkit draws inspiration from previous web campaigns'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/shutterstock_310643786.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We discovered a web social engineering toolkit that allows crooks to create fake update notification campaigns on both desktop and mobile in up to 30 different languages.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/social-engineering\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/domen\/\" rel=\"tag\">Domen<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eitest\/\" rel=\"tag\">eitest<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fakeupdates\/\" rel=\"tag\">FakeUpdates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hoeflertext\/\" rel=\"tag\">hoeflertext<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/netsupport\/\" rel=\"tag\">NetSupport<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rat\/\" rel=\"tag\">rat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/socgholish\/\" rel=\"tag\">SocGholish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/' title='New social engineering toolkit draws inspiration from previous web campaigns'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/\">New social engineering toolkit draws inspiration from previous web campaigns<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22814,11158,18060,11973,22815,1810,22816,10510],"class_list":["post-16217","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-domen","tag-eitest","tag-fakeupdates","tag-hoeflertext","tag-netsupport","tag-rat","tag-socgholish","tag-social-engineering"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16217"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16217\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16217"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}