Found a new? fake browser update that has a currently broken click location. I don't know how long it has been around, but it is not one of the currently tracked clusters.
Example Triage https://tria.ge/231004-ll7kpsce52/behavioral1
Found a new? fake browser update that has a currently broken click location. I don't know how long it has been around, but it is not one of the currently tracked clusters.
Example Triage https://tria.ge/231004-ll7kpsce52/behavioral1
@GustyDusty tracing from here
https://urlscan.io/result/afaeef54-0c29-4712-b950-287638779e1a/#transactions
There's an earlier host used:
verifiedtourist[.]com
@GustyDusty I had assumed that the verifiedtourist also did fakeupdate, but no, it's got some crypto scam instead.
So onlinecasinopinup is used for crypto scam or fake update based on the /path used.
/bro for crypto, which seems fitting
/main for fake update
Just realized saying "crypto scam" is a bit redundant.
@GustyDusty Got a response from the download url.
christopherchabannes[.]com/download/dwnl.php
It did a 302 to here:
aspminube[.]com/temp/Chrome-x64.msix
@GustyDusty it uses this which looks just like a domain you pointed out ClearFake lead to.
fresh-prok[.]site
So maybe related to ClearFake. At least that part of the infrastructure.
https://infosec.exchange/deck/@GustyDusty/111018175913885319
@GustyDusty checking up on your find I see they've compromised a fresh batch of sites.
https://urlscan.io/search/#onlinecasinopinup.xyz
When I check them, they're all very simple injections pointing to the /bro crypto. But currently I'm not getting any response from it.
Of note is that one of the sites also has an active SmartApeSG. Curious. The payload from the other day had a ClearFake related domain. Maybe all the same TA just trying different techniques.