๐Ÿšจ Phishing: de nepsite waar ik op 6 รฉn 12 okt. over schreef (resp.https://todon.nl/@ErikvanStraten/115323922859027525 en )https://todon.nl/@ErikvanStraten/115363066193164967 is nog steeds live (screenshot van 16:15 vanmiddag).

Deze nepsite "draait" op een door cybercriminelen gehuurde server van OVH. Van de 147 domeinnamen van reguliere websites op die server worden er 123 door minstens รฉรฉn virusscanner als kwaadaardig gedetecteerd, maar dat zijn ze (mijn inschatting) allemaal.

Ik heb zojuist een tabel met alle 147 foute domeinnamen te gepubliceerd in https://www.security.nl/posting/909740.

Nb. het is zinloos om de websitenamen (domeinnamen) van nepsites bij te houden of zelfs te onthouden, want elke dag komen er vele duizenden nieuwe bij en worden de websites van ongeveer evenveel voor weinig geld verkocht aan domeinnaam-parkeerders - die de domeinnamen in een paar jaar "witwassen".

Meer info over die OVH server postte ik eerder (op 12 oktober) in https://security.nl/posting/908855 en daaronder in https://security.nl/posting/908859.

#Phishing #DomeinNaam #WebsiteNaam #BigTechIsEvil #DV #DomainValidated #VanWIEisEenWebsite #OV #OrganizationValidated #EV #ExtendedValidation #EchtVanNepOnderscheiden #NepVanEchtOnderscheiden

๐Ÿšจ Phishing: de nepsite waar ik op 6 okt. over schreef (https://todon.nl/@ErikvanStraten/115323922859027525) is nog steeds live (screenshot van 22:14 vanavond).

Een paar andere virusscanners bestempelen de site nu als kwaadaardig, maar dat is veel te laat en het zijn er nog steeds veel te weinig.

Meer info hierover postte ik eerder vanavond in https://security.nl/posting/908855 en daaronder in https://security.nl/posting/908859.

#Phishing #DomeinNaam #WebsiteNaam #BigTechIsEvil #DV #DomainValidated #VanWIEisEenWebsite #OV #OrganizationValidated #EV #ExtendedValidation #EchtVanNepOnderscheiden #NepVanEchtOnderscheiden

@ma1 : looks like this is why MS makes Outlook stop rendering SVG: https://www.bleepingcomputer.com/news/security/microsoft-outlook-stops-displaying-inline-svg-images-used-in-attacks/.

From hxxps://xss[.]report/ :
"Welcome to XSS.Report

Blind XSS Platform Discover and address blind XSS vulnerabilities effectively using the automated services of xss.report.
[...]
ยฉ For bug bounty hunters โ€“ All rights reserved."

https://www.virustotal.com/gui/url/b711ae35dff30c564e411696ef2bb5d0cecbf22e8636aac3418b248d61cb66ed/detection: 0/98

Hiding behind Cloudflare: https://www.virustotal.com/gui/ip-address/104.21.27.56/relations (of course).

Anonymous DV certs from Sectigo and "Google Trust Services: https://crt.sh/?q=xss.report

(Thanks a million for NoScript!)

@thunderbird

#SVG #XSS #NoScript #CloudflareIsEvil #BigTechIsEvil #DV #DomainValidated #GoogleIsEvil

Als u twijfelt over de echtheid (authenticiteit) van een website, kunt u meer doen dan het certificaat in uw browser checken (voor zover uw browser dat รผberhaupt mogelijk maakt). Twee voorbeelden:

1๏ธโƒฃ Check het certificaat online. Nb. deze website is soms erg traag of geeft vreemde fourmeldingen door timeouts.

โ€ข Open https://crt.sh/?a=1

โ€ข Vink aan: "Deduplicate (pre)certificate pairs?"

โ€ข Vink evt. aan: "Exclude expired certificates?"

โ€ข Vul de kale websitenaam in (zonder https:// ervoor en zonder / erachter).

In het linker plaatje (nepsite) ziet u dat de nepsite 2x een certificaat had met daartussen 3 jaar niets. Rechts de echte site. Daaronder van beide sites de belangrijkste details in het laatste certificaat.

2๏ธโƒฃ Check VirusTotal (een website overgenomen door Google die met bijna 100 virusscanners ook websites checkt (voor zover mogelijk).

โ€ข Open https://virustotal.com

โ€ข Kies voor "URL" als u een link wilt laten checken, of "SEARCH" als u een websitenaam wilt invoeren (en bestaande resultaten wilt bekijken).

Bijv. in https://www.virustotal.com/gui/domain/mijn-kpn.info/detection ziet u dat momenteel 5 (van 95!) virusscanners kwaad zien in de nepsite, en twee aanvullende "suspicious" melden.

#DV #DomainValidated #Certificates #VirusTotal #crt_sh #EV #ExtendedValidation #OV #OrganizationValidated

Let op de websitenaam, trap niet in phishing!

De volgende websitenaam (ook bekend als domeinnaam):

mijn-kpnโ€คinfo

is van oplichters!

Kijk, direct na openen, altijd รฉรฉrst naar de websitenaam voordat u naar de webpagina kijkt; de pagina kan identiek zijn aan die van de echte website. U kunt dรกรกr te vaak niets interessants uit afleiden om nep van echt te kunnen onderscheiden.

De websitenaam van de echte site luidt:

inloggen.kpn.com

(bron: https://www.security.nl/posting/907657/KPN+Scam%3F).

Onthoud in elk geval:

โ€ข Lees websitenamen van rechts naar links en vraag je bij elk "segment" (of sub- / hoofddomein = TLD = Top Level Domain, zoals "com" of "nl") af of het klopt

โ€ข Links van elke punt is een subdomein van wat rechts van de punt staat (de punt is het enige scheidingsteken in websitenamen)

โ€ข Een minnetje '-' is gรฉรฉn scheidingsteken in websitenamen!

Nb. "mijn-kpn" is dus een subdomein van ".info" (kennelijk was de websitenaam "mijn-kpnโ€คcom" al bezet).

Checken of een website niet nep is kan helaas een hele puzzel zijn. Meer info: https://security.nl/posting/906992 (zie ook de Alt tekst "onder" de plaatjes hieronder).

#Phishing #DomeinNaam #WebsiteNaam #BigTechIsEvil #DV #DomainValidated #VanWIEisEenWebsite #OV #OrganizationValidated #EV #ExtendedValidation #EchtVanNepOnderscheiden #NepVanEchtOnderscheiden

@jscalzi : please stop using a http links if websites support https.

By specifying https://vote.org (or https://vote.org/ which gives the same result) in a link, or by typing https://vote.org in the address bar of your browser, there are three possibilities:

1) the browser connects to the _real_ vote.org website;

2) the browser displays a certificate error (never continue in such a case);

3) extemely unlikely (see [1]): the browser connects to a fake website that managed to obtain a valid certificate for the vote.org domain name.

(Note: I used the Unicode '/' character instead of the regular slash char '/' to prevent Mastodon from hiding the protocol).

By default, _none_ of the popular web browsers prevents active (i.e. not passive) criminals from successfully conducting Man-in-the-Middle attacks - if the first connection-attempt uses http.

Most browsers _may_ TRY https first, but an attacker can block that request, forcing the browser to downgrade to http (if the user explicitly requested https, such a downgrade to http will _not_ happen).

Such attacks can be conducted in various ways, such as by using an "evil twin" WiFi access point (https://www.bleepingcomputer.com/news/security/australian-charged-for-evil-twin-wifi-attack-on-plane/) or by manipulating DNS replies to browsers.

Note: the domain "vote.org" is currently _not_ listed in the HSTS preload list (apparently it was removed because of stupidities): https://hstspreload.org/?domain=vote.org (being listed would _force_ browsers to use https, even if "the user" requested http by tapping on such a link).

See also the unnecessarily poor results in https://internet.nl/site/vote.org/2883671/

Unfortunately also @BleepingComputer regularly uses unnecessary http links in their articles.

[1] More info: https://infosec.exchange/@Bitwiper/112779974228111155

@adamshostack

#http #https #httpsvshttp#httpvshttps #AitM #MitM #EvilTwin #DNS #DNSAttacks #DV #DomainValidated #DomainValidation #Certificates #TLSCertificates #httpsCertificates #httpsServerCertificates #ServerCertificates #Authentication #Impersonation

Everything You Need to Vote - Vote.org

Register to vote. Check your registration status. Get your absentee ballot. Fast, free, easy, secure, nonpartisan.

Yesterday Bill Toulas of Bleeping Computer wrote:

"DNS hijacks target crypto platforms registered with Squarespace" (https://www.bleepingcomputer.com/news/security/dns-hijacks-target-crypto-platforms-registered-with-squarespace/):

ยซ A wave of coordinated DNS hijacking attacks targets decentralized finance (DeFi) cryptocurrency domains using the Squarespace registrar, redirecting visitors to phishing sites hosting wallet drainers. ยป

Not mentioned is that the attackers probably attemped (and possibly succeeded) to obtain valid https certificates for their fake servers. A bit of research using crt.sh (and VirusTotal) reveals the following i.r.t. the four DeFi domains mentioned in the article, in the same order of appearence.

โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
1) compound.finance
โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
They seem to be unaffected: according to https://crt.sh/?q=compound.finance *NO* certificates were approved since July 5.

Note that it is very irresponsible behavior of GTS (Google Trust Services) to *not always* (but rather *sometimes*, like https://crt.sh/?id=13624751017) log leaf certificates in the CT (Certificate Transparency) ledger (Google *does* always seem to log precertificates, but precisely in a case like this they are *less* interesting).

For more info on the erratic GTS behavior, the pointlessness of short lived certs and the difference between a "precertificate" and a "leaf certificate", see my response to this toot (which I'll add later).

โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
2) celer.network
โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
According to https://crt.sh/?q=celer.network, one precertificate was issued on July 11: https://crt.sh/?id=13694629335 (by LE = Let's Encrypt). Because LE leaf certs are always logged to CT, it looks like someone prevented counter signers from issuing a usable certificate - that would be a near success (for the attackers)

Note #1: at the top of https://crt.sh/?id=13694629335 one can read that Digicert and Sectigo already had countersigned this precertificate.

Note #2: in 2022 a DV certificate was issued for cbridge-prod2.celer.network which, as the result of a deliberate BGP hijack, led to a totally different attacker-owned server: https://arstechnica.com/information-technology/2022/09/how-3-hours-of-inaction-from-amazon-cost-cryptocurrency-holders-235000/ (more details here: https://www.certik.com/resources/blog/1NHvPnvZ8EUjVVs4KZ4L8h-bgp-hijacking-how-hackers-circumvent-internet-routing-security-to-tear-the).

โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
3a) pendle.finance
โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
As can be seen in https://crt.sh/?q=pendle.finance, a precert and a leaf cert (https://crt.sh/?id=13700814700&opt=ocsp) have been issued on July 11 by Sectigo, most likely to the attackers (*). This cert is valid for 1 year.

And it has not yet been revoked!

This means that, *if* it is in the hands of attackers (provided that they possess the associated private key, a certificate is public), it can be used in attacks where DNS-responses to individuals are forged.

(*) Because of the date (July 11) and because the owners of '*.pendle.finance' and 'pendle.finance' did not need a new "1 year valid" cert at all (I'd expect a new request in Jan. 2025):
2024-07-11 - 2025-07-11 <= weird
2024-02-13 - 2025-02-12 (2x)
2023-03-06 - 2024-03-05

โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
3b) pendle.fi (==> pendle.finance)
โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
https://crt.sh/?q=pendle.fi reveals that one precert was issued specifically for 'campaign.pendle.fi' on July 11.

Zooming in to https://crt.sh/?q=campaign.pendle.fi reveals one precertificate, issued by LE; like the 'celer.network' precert this attack appears to have been stopped in time (provided that crt.sh would have been updated by now *if* the leaf cert was actually issued.

Note #1: the owners of 'pendle.fi' had not used that subdomain name 'campaign' before (OTOH 'campaign.pendle.finance' was used before). So this may have been a carefully planned attack where a *subdomain* was added to the DNS records of 'pendle.fi', a technique called "domain shadowing" (https://unit42.paloaltonetworks.com/domain-shadowing/).

Note #2: in https://crt.sh/?spkisha256=5e3bbe888394436be58b950a67af6be91877992d73258e237030ce1db6bd4114 can be seen that a GTS leaf cert was logged to CT on July 11, while the corresponding precert had been logged on May 27 (such delayed logging sucks, but apparently it was not obtained by the attackers).

โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
4) unstoppabledomains.com
โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”
Although I found some weird things i.r.t. certificates issued for this domain, I found no evidence that attackers managed to obtain DV certs for their servers impersonating "unstoppable domains".

โ€”โ€”โ€”โ€”โ€”โ€”โ€”
Conclusion
โ€”โ€”โ€”โ€”โ€”โ€”โ€”
Again DeFi sites have been subjected to attacks. It looks like most attacks were detected in an early stage, but some users may have been unlucky by accessing fake sites for the time they existed.

I'm not fully sure whether the 'pendle.finance' leaf cert issued by Sectigo was requested by the legitimate domain owner, or by attackers (it has not been revoked).

IMO, DV certs (even short lived ones, bacause *hours* may suffice for attackers) do not sufficiently protect against BGP or DNS hijack attacks, and neither against "legitimate" Man-in-the-Middle proxying as used by parties like Cloudflare and Fastly (https://infosec.exchange/@Bitwiper/112772374882006712), or by "near the server" MitM attackers (https://notes.valdikss.org.ru/jabber.ru-mitm/).

@BleepingComputer @billtoulas

#DV #DomainValidated #Certificates #DeFi #Crypto #CryptoCoins #BGPHijack #DNSHijack #DNS #BGP

DNS hijacks target crypto platforms registered with Squarespace

A wave of coordinated DNS hijacking attacks targets decentralized finance (DeFi) cryptocurrency domains using the Squarespace registrar, redirecting visitors to phishing sites hosting wallet drainers.

BleepingComputer