Saturday, December 04, 2021

Automated Social Engineering Driven OTP (One-Time-Passwords) and Two Factor Authentication Bypassing Platform and Mobile Application Spotted in the Wild - An Analysis

I've recently stumbled upon a newly released DIY social engineering and OTP (One-Time-Passwords) and two-factor authentication bypassing platform and mobile application which is fully capable of socially engineering a gullible end user into falling victim into a targeted social engineering driven campaign that's currently impersonating a variety of services and financial institutions globally.


Sample screenshots of the DIY OTP (One-Time Passwords) and two-factor authentication bypassing platform:




















Indian-Based VoIP SIP Provider Fuels Growth In Russia's Caller ID Spoofer Services Market Segment - An Analysis

I've just stumbled upon a currently active and pretty prolific across the cybercrime ecosystem Caller ID and one-time-password bypassing the verification services which is currently advertised on several cybercrime-friendly forum communities courtesy of  the India-based company known as Sipco Systems where the ultimate goal is to offer and provide cybercriminals internationally with the necessary Caller ID and online mobile application based stores verification process services allowing them to commit related cybecriminal activity online.

Sample domain known to have been involved in the campaign:
htxxp://ispoof.cc

Sample screenshots of the Caller ID and one-time-password interception cybercrime-friendly service:













\
These services are just the tip of the iceberg and the ability to come up with a spoofed or custom caller ID in an automated fashion can be definitely attributed to a growing social engineering vector based market segment that's also fully and successfully capable of intercepting one-time-passwords including to result in possible mobile application store verification process fraud and bypassing.

Yet Another Currently Active E-Shop for Stolen Credit Cards Information Spotted in the Wild - An Analysis

I've just stumbled upon yet another currently active E-Shop for stolen and compromised credit cards information and I've decided to share additional actionable intelligence on its online infrastructure including to discuss the possible fraudulent and malicious schemes that could originate based on the existence of such E-Shops for stolen and compromised credit cards information.

Sample domains known to have been involved in the campaign:

https://rescator.cn
https://rescator.sh
\
Sample Dark Web Onion known to have been involved in the campaign:

http://rescatorfof3pwgux4olwxxcd22yjtuj72kmdltyr6tsr6jfohpnhead.onion

Sample screenshots from the rogue and fraudulent E-Shop for stolen credit cards information:














The E-Shop for stolen credit cards information is courtesy of one of the infamous cybercrime-friendly forum communities known as - hxxps://lampeduza.cm.

Profiling Yet Another Currently Active E-Shop for Stolen and Compromised Credit Cards Information - An Analysis

I've recently stumbled upon yet another currently active online E-Shop for stolen and compromised credit cards information and I've decided to provide some actionable intelligence on its online infrastructure including to discuss the possible revenue schemes that could originate from the existence of such E-Shops for stolen credit cards information. 

Sample domain known to have been involved in the campaign:
hxxps://ugmarket.cc

Sample screenshots of the rogue and fraudulent E-Shop for stolen credit cards information:






The possibilities for related fraudulent and malicious online activity that could originate from the existence of such E-Shops for stolen and compromised credit cards information are limitless in the context of having the bad guys steal actual financial amounts directly from the victims or using them in related purchases that also includes the use of money mules to cash out the amounts.