After installing Wappalyzer in my browser, I decided to test its functionality by visiting a familiar website. To my surprise, I was unexpectedly redirected to a spear phishing campaign. Knowing the website's usual practices, it seemed highly unlikely that they would intentionally redirect their visitors in such a manner. Intrigued by this anomaly, I took it upon myself to investigate the underlying cause of this redirection.
I have not yet known how threat actors implanted the Javascript Code in the victim's application but this is what it looked like.
What does the code do?
The code is simply importing script from biggerfun[.]org domain. In other words, it's simply doing <script src="biggerfun[.]org"></script>
Further investigation
How many hosts are infected?
Shodan results
Shodan requires some time for updates, and to the best of my knowledge, their scanners operate on IP addresses. Owing to vHosts, a single server can host multiple websites, all accessible from the same IP address, depending on the value of the HTTP Request header HOST. Hence, there should be more victims then the number shown by Shodan.
Analysis of threat actor's website
Malicious website: biggerfun[.]org
After bruteforcing the paths I found /admin
This could be a honeypot or a login page to their C2 dashboard.
Exposing more websites used in this campaign to host malicious Javascript code
1. emperorplan[.]org
2. catsndogz[.]org
3. treegreeny[.]org
4. cardladyjob[.]live
5. cjvdfw[.]com

Comments
Post a Comment