{"id":24264,"date":"2024-04-15T08:35:44","date_gmt":"2024-04-15T16:35:44","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-17994\/"},"modified":"2024-04-15T08:35:44","modified_gmt":"2024-04-15T16:35:44","slug":"news-17994","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-17994\/","title":{"rendered":"Fake Lawsuit Threat Exposes Privnote Phishing Sites"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Thu, 04 Apr 2024 14:12:16 +0000<\/strong><\/p>\n<p>A cybercrook who has been setting up websites that mimic the self-destructing message service <strong>privnote.com<\/strong> accidentally exposed the breadth of their operations recently when they threatened to sue a software company. The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses will be automatically altered to include a different payment address controlled by the scammers.<\/p>\n<div id=\"attachment_67081\" style=\"width: 758px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-67081\" decoding=\"async\" loading=\"lazy\" class=\" wp-image-67081\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/privnotedotcom.png\" alt=\"\" width=\"748\" height=\"746\" \/><\/p>\n<p id=\"caption-attachment-67081\" class=\"wp-caption-text\">The real Privnote, at privnote.com.<\/p>\n<\/div>\n<p>Launched in 2008, privnote.com employs technology that encrypts each message so that even Privnote itself <a href=\"https:\/\/privnote.com\/info\/privacy\" target=\"_blank\" rel=\"noopener noreferrer\">cannot read its contents<\/a>. And it doesn\u2019t send or receive messages. Creating a message merely generates a link. When that link is clicked or visited, the service warns that the message will be gone forever after it is read.<\/p>\n<p>Privnote&#8217;s ease-of-use and popularity among cryptocurrency enthusiasts has made it <a href=\"https:\/\/krebsonsecurity.com\/2020\/06\/privnotes-com-is-phishing-bitcoin-from-users-of-private-messaging-service-privnote-com\/\" target=\"_blank\" rel=\"noopener\">a perennial target of phishers<\/a>, who erect Privnote clones that function more or less as advertised but also quietly inject their own cryptocurrency payment addresses when a note is created that contains crypto wallets.<\/p>\n<p>Last month, a new user on <strong>GitHub<\/strong> named <strong>fory66399<\/strong> <a href=\"https:\/\/github.com\/MetaMask\/eth-phishing-detect\/issues\/29814\" target=\"_blank\" rel=\"noopener\">lodged a complaint<\/a> on the &#8220;issues&#8221; page for <strong>MetaMask<\/strong>, a software cryptocurrency wallet used to interact with the Ethereum blockchain. Fory66399 insisted that their website &#8212; <strong>privnote[.]co<\/strong> &#8212; was being wrongly flagged by MetaMask&#8217;s &#8220;eth-phishing-detect&#8221; list as malicious.<\/p>\n<p>&#8220;We filed a lawsuit with a lawyer for dishonestly adding a site to the block list, damaging reputation, as well as ignoring the moderation department and ignoring answers!&#8221; fory66399 threatened. &#8220;Provide evidence or I will demand compensation!&#8221;<\/p>\n<p>MetaMask&#8217;s lead product manager <strong>Taylor Monahan<\/strong> replied by posting several screenshots of privnote[.]co showing the site did indeed swap out any cryptocurrency addresses.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-67040\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tayprivnoteco.png\" alt=\"\" width=\"750\" height=\"774\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tayprivnoteco.png 858w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tayprivnoteco-768x792.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tayprivnoteco-782x807.png 782w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>After being told where they could send a copy of their lawsuit, Fory66399 appeared to become flustered, and proceeded to mention a number of other interesting domain names:<\/p>\n<blockquote>\n<p>You sent me screenshots from some other site! It&#8217;s red!!!!<br \/> The tornote.io website has a different color altogether<br \/> The privatenote,io website also has a different color! What&#8217;s wrong?????<\/p>\n<\/blockquote>\n<p>A search at <a href=\"https:\/\/www.domaintools.com\" target=\"_blank\" rel=\"noopener\">DomainTools.com<\/a> for privatenote[.]io shows it has been registered to two names over as many years, including <strong>Andrey Sokol<\/strong> from Moscow and <strong>Alexandr Ermakov<\/strong> from Kiev. There is no indication these are the real names of the phishers, but the names are useful in pointing to other sites targeting Privnote since 2020.<\/p>\n<p>DomainTools says other domains registered to Alexandr Ermakov include <strong>pirvnota[.]com<\/strong>, <strong>privatemessage[.]net<\/strong>, <strong>privatenote[.]io<\/strong>, and <strong>tornote[.]io<\/strong>.<\/p>\n<div id=\"attachment_67046\" style=\"width: 757px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-67046\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-67046\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/privatemessage.png\" alt=\"\" width=\"747\" height=\"461\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/privatemessage.png 1104w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/privatemessage-768x474.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/privatemessage-782x482.png 782w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/p>\n<p id=\"caption-attachment-67046\" class=\"wp-caption-text\">A screenshot of the phishing domain privatemessage dot net.<\/p>\n<\/div>\n<p>The registration records for pirvnota[.]com at one point were updated from Andrey Sokol to &#8220;<strong>BPW<\/strong>&#8221; as the registrant organization, and &#8220;<strong>Tambov district<\/strong>&#8221; in the registrant state\/province field. Searching DomainTools for domains that include both of these terms reveals <strong>pirwnote[.]com<\/strong>.<\/p>\n<p>Other Privnote phishing domains that also phoned home to the same Internet address as pirwnote[.]com include <strong>privnode[.]com<\/strong>, <strong>privnate[.]com<\/strong>, and <strong>prevn\u00f3te[.]com<\/strong>. Pirwnote[.]com is currently selling security cameras made by the Chinese manufacturer <a href=\"https:\/\/krebsonsecurity.com\/tag\/hikvision\/\" target=\"_blank\" rel=\"noopener\">Hikvision<\/a>, via an Internet address based in Hong Kong.<\/p>\n<p>It appears someone has gone to great lengths to make tornote[.]io seem like a legitimate website. For example, <a href=\"https:\/\/medium.com\/@tornoteprivnote\" target=\"_blank\" rel=\"noopener\">this account at Medium<\/a> has authored more than a dozen blog posts in the past year singing the praises of Tornote as a secure, self-destructing messaging service. However, <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tornote-before.png\" target=\"_blank\" rel=\"noopener\">testing<\/a> <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tornote-after.png\" target=\"_blank\" rel=\"noopener\">shows<\/a> tornote[.]io will also replace any cryptocurrency addresses in messages with their own payment address.<span id=\"more-67035\"><\/span><\/p>\n<p>These malicious note sites attract visitors by gaming search engine results to make the phishing domains appear prominently in search results for &#8220;privnote.&#8221; A search in Google for &#8220;privnote&#8221; currently returns tornote[.]io as the fifth result. Like other phishing sites tied to this network, Tornote will use the same cryptocurrency addresses for roughly 5 days, and then rotate in new payment addresses.<\/p>\n<div id=\"attachment_67044\" style=\"width: 758px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-67044\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-67044\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tornote-after.png\" alt=\"\" width=\"748\" height=\"457\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tornote-after.png 1280w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tornote-after-768x469.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/tornote-after-782x478.png 782w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/p>\n<p id=\"caption-attachment-67044\" class=\"wp-caption-text\">Tornote changed the cryptocurrency address entered into a test note to this address controlled by the phishers.<\/p>\n<\/div>\n<p>Throughout 2023, Tornote was hosted with the Russian provider <a href=\"https:\/\/krebsonsecurity.com\/tag\/ddos-guard\/\" target=\"_blank\" rel=\"noopener\">DDoS-Guard<\/a>, at the Internet address <strong>186.2.163[.]216<\/strong>. A review of the passive DNS records tied to this address shows that apart from subdomains dedicated to tornote[.]io, the main other domain at this address was <strong>hkleaks[.]ml<\/strong>.<\/p>\n<p>In August 2019, a slew of websites and social media channels dubbed &#8220;HKLEAKS&#8221; began doxing the identities and personal information of pro-democracy activists in Hong Kong. According to <a href=\"https:\/\/tspace.library.utoronto.ca\/bitstream\/1807\/128586\/1\/Report%23168--hkleaks-061323.pdf\" target=\"_blank\" rel=\"noopener\">a report<\/a> (PDF) from <strong>Citizen Lab<\/strong>, hkleaks[.]ml was the second domain that appeared as the perpetrators began to expand the list of those doxed.<\/p>\n<div id=\"attachment_67042\" style=\"width: 758px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-67042\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-67042\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/hkleaks.png\" alt=\"\" width=\"748\" height=\"257\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/hkleaks.png 1373w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/hkleaks-768x264.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/hkleaks-782x269.png 782w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/p>\n<p id=\"caption-attachment-67042\" class=\"wp-caption-text\">HKleaks, as indexed by The Wayback Machine.<\/p>\n<\/div>\n<p>DomainTools shows there are more than 1,000 other domains whose registration records include the organization name &#8220;BPW&#8221; and &#8220;Tambov District&#8221; as the location. Virtually all of those domains were registered through one of two registrars &#8212; Hong Kong-based <strong>Nicenic<\/strong> and Singapore-based <strong>WebCC <\/strong>&#8212; and almost all appear to be phishing or pill-spam related.<\/p>\n<p>Among those is <strong>rustraitor[.]info<\/strong>, a website erected after Russia invaded Ukraine in early 2022 that doxed Russians perceived to have helped the Ukrainian cause.<\/p>\n<div id=\"attachment_67043\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-67043\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-67043\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/rustraitor.png\" alt=\"\" width=\"750\" height=\"351\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/rustraitor.png 1456w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/rustraitor-768x359.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/rustraitor-782x366.png 782w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p id=\"caption-attachment-67043\" class=\"wp-caption-text\">An archive.org copy of Rustraitor.<\/p>\n<\/div>\n<p>In keeping with the overall theme, these phishing domains appear focused on stealing usernames and passwords to some of the cybercrime underground&#8217;s busiest shops, including <a href=\"https:\/\/krebsonsecurity.com\/?s=briansclub\" target=\"_blank\" rel=\"noopener\">Brian&#8217;s Club<\/a>. What do all the phished sites have in common? They all accept payment via virtual currencies.<\/p>\n<p>It appears MetaMask&#8217;s Monahan made the correct decision in forcing these phishers to tip their hand: Among the websites at that DDoS-Guard address are multiple MetaMask phishing domains, including <strong>metarrnask[.]com<\/strong>,<strong> meternask[.]com<\/strong>, and <strong>rnetamask[.]com<\/strong>.<\/p>\n<p>How profitable are these private note phishing sites? Reviewing the four malicious cryptocurrency payment addresses that the attackers swapped into notes passed through privnote[.]co (as pictured in Monahan&#8217;s screenshot above) shows that between March 15 and March 19, 2024, those address raked in and transferred out nearly $18,000 in cryptocurrencies. And that&#8217;s just one of their phishing websites.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2024\/04\/fake-lawsuit-threat-exposes-privnote-phishing-sites\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2024\/04\/privnotedotcom.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Thu, 04 Apr 2024 14:12:16 +0000<\/strong><\/p>\n<p>A cybercrook who has been setting up websites that mimic the self-destructing message service Privnote.com accidentally exposed the breadth of their operations recently when they threatened to sue a software company. The disclosure revealed a profitable network of phishing sites that behave and look like the real Privnote, except that any messages containing cryptocurrency addresses will be automatically altered to include a different payment address controlled by the scammers.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16740,31224,31225,16695,31226,31227,16888,25936,31228,31229,25263,30066,31230,17006],"class_list":["post-24264","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-a-little-sunshine","tag-alexandr-ermakov","tag-andrey-sokol","tag-breadcrumbs","tag-fory66399","tag-hkleaks","tag-latest-warnings","tag-metamask","tag-privnote","tag-privnote-com","tag-russias-war-on-ukraine","tag-taylor-monahan","tag-tornote-io","tag-web-fraud-2-0"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24264"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24264\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}