CyberWire Daily - How a wide scale Facebook campaign stole 1 million credentials. [Research Saturday]

Episode Date: August 27, 2022

Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." Du...ring routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli. The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective." The research can be found here: Phishing tactics: how a threat actor stole 1M credentials in 4 months Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. of you, I was concerned about my data being sold by data brokers. So I decided to try Delete.me. I have to say, Delete.me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life Thank you. JoinDeleteMe.com slash N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com slash N2K and enter code N2K at checkout. That's JoinDeleteMe.com slash N2K, code N2K. Hello, everyone, and welcome to the CyberWire's Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts
Starting point is 00:01:38 tracking down the threats and vulnerabilities, solving some of the hard problems of protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. In early 2021, we had a lot of detections in the platform for fake Facebook login portals that always had a very similar structure to them. That's Nick Ascoli. He's a founder and threat researcher at 4Trace. The research we're discussing today is titled Fishing Tactics, How a Threat Actor Stole 1 Million Credentials in 4 Months.
Starting point is 00:02:33 And now, a message from our sponsor, Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024, these traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler Zero Trust Plus AI stops attackers by hiding your attack surface, making apps and IPs invisible, eliminating lateral movement, connecting users only to specific apps, not the entire network, continuously verifying every request based on identity and context,
Starting point is 00:03:19 simplifying security management with AI-powered automation, and detecting threats using AI to analyze over 500 billion daily transactions. Hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more at zscaler.com slash security. The only thing that would change between the different pages that were ending up in our platform were the server loading the script, the name of the server loading the script, and a username associated with a stats tracking application that the adversary was using to monitor the traffic to their webpages.
Starting point is 00:04:10 So we pretty quickly figured out that we were able to, without needing to authenticate to the service, use that username in the stats tracking application and view the traffic going to the webpage as well, and also view the URLs they were spinning up. So originally, this came on our radar through users clicking links, phishing links, and having them reported to our platform. But we ended up being able to sort of get ahead of the adversary by being able to watch them spin up links, whether they were reported to anyone or not. Yeah, that's interesting.
Starting point is 00:04:42 I mean, the whole notion that I suppose they were doing this for their own convenience to be able to, you know, to track how they were doing, but really that sets you on the path. Yeah. And they are still using it to this day. So the attack continues as we speak and the same tool suites and the same code base are still in use and still seeing success on Facebook. Well, let's walk through it together here. I mean, exactly what's going on? How would someone find themselves falling prey to this? So the links originate in Facebook Messenger. So the adversary will successfully harvest someone's Facebook credentials,
Starting point is 00:05:20 typically through someone logging in through one of their fake Facebook login portals. They will take those credentials, and based on the speed we've observed, it's very likely automated and well automated at this point, where when a user enters their credentials in one of their fake login portals, they will automatically log into that individual's account, that individual's Facebook account, and automatically, through Facebook Messenger, deliver whatever the latest link is in their infrastructure, whatever the latest link is that is hosting a fake Facebook login portal, and send it to all of the users' contacts in Facebook Messenger. So that takes it from one user to potentially hundreds, potentially thousands. And using the graph protocol in Facebook's Messenger, they're able to have the target recipient's name appear in the URL. So it makes it look a little bit more convincing to the end user. And it's usually a message that is relatively obviously scammy or spammy, like, you should see this video of you at the Christmas party or something with their name embedded in
Starting point is 00:06:23 the actual link. And then when a user clicks it, it says it takes them to a fake Facebook login page that says in order to view this video, you must log into Facebook first. So it's a relatively innocuous and to a lay user, a pretty convincing sequence of events. Right. It strikes me too,
Starting point is 00:06:42 that if you get a message from a friend, a Facebook friend, and it says, hey, have you seen this video, that may put you in an emotional state of not wanting to be patient. What video? What could this be, which may get your guard down? are intending to make it seem as urgent as possible so that when the URL loads, which sometimes if you load it via the mobile app, which we see most users doing, they won't actually see the URL. So they won't see that it's a fake, you know, that the actual login portal is not owned by Facebook. If you're on a desktop, you'll see it in the browser.
Starting point is 00:07:18 But, you know, to a user who has not gone through, like, phishing education, they might not know the difference. They might think, assume it's some third-party web service that's using Facebook to authenticate you. So they demand some urgency in the links they send in order to get you to do as little research on your end as possible before entering your credentials. Yeah. So let's say I fall for it and I enter my credentials. What happens next? So they will log into your account, presumably automatically, and spam that link out to as many contacts
Starting point is 00:07:50 as they can find in Facebook Messenger. So it seems like most of the traffic we've observed as of late is focused in regions pretty consistently. So once the link ends up, most of the traffic is in the United States. I think that's where a lot of Facebook's user base is, especially that uses Messenger. But once we see a link arrive in Argentina or Jamaica, for example, we'll then see it fly all over the country, like hundreds and hundreds of visitors quickly into the tens of thousands of visitors from those countries. The threat actor themselves is not targeting a particular geography. They're just targeting Facebook. They make more money from American users because the ad services that they redirect you to after you enter your credentials pay a little bit more for users coming from America.
Starting point is 00:08:35 But typically, we see it fly across countries very, very quickly once one person in a new geography gets the link. So there is no regional focus. It's relatively predictable in its pattern. Once it arrives in a country, it'll be entering the messenger inboxes of tons of people in that country and proliferating naturally that way. Well, you mentioned it briefly. So after I put in my login credentials to the fake Facebook website or the fake Facebook login page, then it sends me to an ad page? Yeah. So they have a couple really interesting techniques that demonstrate some frightening, but also on the threat actor side, relatively interesting and somewhat impressive trends.
Starting point is 00:09:26 But what they do now is once you've entered your credentials on the page, they will redirect you several times through different ad tracking services. So on the ad tracking services side, they're occasionally malvertising, they're occasionally legitimate advertising services. On the advertiser side, all they're seeing is someone who's signed up with their web advertising service is throwing tons of traffic their way. They think that's great. You're cutting logs on their advertisement, so the threat actor is getting paid. What it's actually doing, though, is simply sending you through rows and rows and rows of refreshes. So it's like just, you'll see the URL change if you're doing this like forensically in a browser,
Starting point is 00:10:05 you'll see a change so many times before eventually dropping you on either some scam page asking you for more information, which is simply hosted by a malvertiser, or to a legitimate website that they're getting, they were just in the last tail in the redirect and they are where you're ultimately landing. So you're never landing on a Facebook video. You're landing on some other website that the threat actor is collecting
Starting point is 00:10:28 revenue from in exchange for referring people to that website. And so they get paid whatever, the fraction of a penny or who knows what, for merely having you quickly drive by. Yeah. So what we put together was a researcher in 2021, when we originally picked this up, Mantis Sosnowskis with OWASP, found that the threat actor had a Facebook page associated with the website they were they were making. And the Bender Crack Pro administrator responded with, we make about $150 for every 1,000 visitors from the United States. So based on the scale of the campaign, what we put together was each site, and they were spinning up rapidly. In short, once Mantis put this research out at the end of 2021, we saw things slow down. Once Mantis put this research out at the end of 2021, we saw things slow down. And then when Q1 and Q2 2022, things really sped up. Like the threat actor got a lot more sophisticated in the automation, and the proliferation of the campaign was just organically explosive.
Starting point is 00:11:45 And the view count that we landed at was we were averaging, before they changed URLs on one particular landing page, they would get around a million visitors. And we located about 400 individual landing pages, which we have no way of confirming if that's the entirety of the attack. It seems like it's probably not. It's more likely than not a fraction of it. But through the entire, you know, 1 million views on the 400 to 405 web pages we landed on, million views on the 400 to 405 web pages we landed on, that's about 400 million page views so far in the campaign, most of that traffic being in 2022, which if you apply the price they associated with the viewer to that number, it nets them somewhere around $60 million in just ad revenue. So we're not talking about things that threat actors also usually do with harvested credentials, which is reselling them or potentially marketing them on several different marketplaces for selling stolen credentials. But in ad revenue alone, if we use their figure,
Starting point is 00:12:34 we're putting it at about $60 million. Now, is that realistic? Probably not. But based on the sheer volume of traffic, like we pegged it at roughly 400 million paid views, they are definitely making quite a bit of money simply through ad redirects. Wow. Now, they've also got your Facebook credentials. Do we have any sense that they're bundling those up and selling those? So we haven't seen the particular credentials harvested for sale on any forums that can be accessed easily. Now, whether they're a part of invite-only forums or some deeper marketplaces that are a little more difficult to access in the practices of threat research, we don't know. It's very, it seems unlikely that they're not doing something else with the credentials afterwards because Facebook credentials seem to only be increasing in value despite the sheer volume of them that exist in the wild.
Starting point is 00:13:32 Because increasingly, businesses rely on Facebook for marketing, especially small businesses. And plenty of large and mid-sized companies rely on Facebook for marketing and advertising. So the value of credentials, depending on which credentials have been harvested, can be quite a bit. So the odds that they're not reselling them is low, but we haven't actually seen them reselling them in the wild. So they might be reusing them for internal things, or they might not be reselling them at all. But it wouldn't be consistent with the typical practices of an internet fraudster. Now, in terms of these fake landing pages, what is your sense for how long they stay up before they
Starting point is 00:14:13 have to cycle through a new one? Yeah, we see them typically around for one to two days. So they are in what we presume to be an automated fashion, or at least in the speed that we've observed, is very likely automated, using legitimate web services. The ones we've seen in the wild are glitch.me, onepage.io is something they're using as of right now, samcart, amaze.co. So they use a lot of legitimate web services who are not blocking their activity at all. They're not blocking their accounts. They're not stopping them from using their web service to proliferate these attacks. So the threat actor is signing up for one of these services and then on a daily basis, spinning up new domains and sending them
Starting point is 00:14:53 out. So the benefit to them is one, even if a URL does get burned or reported as phishing, they're creating new ones on a daily basis automatically anyway to proliferate the attack. And two, their use of these legitimate services makes it really difficult for Facebook or other social media networks to block them because real businesses are using glitch.me and onepage.io and SamCart for legitimate business on these social networks.
Starting point is 00:15:18 So the challenge for Facebook is if they block that outright, the parent domain of onepage.io or samcart.com, they're blocking a lot of legitimate business going on on their website and in Facebook Messenger. So the adversary is able to skirt detections by using these legitimate web pages to host their malicious content. And we see them rotate through these different quick deploy web application services on a weekly to biweekly basis and spinning up new domains on a daily to bi-daily basis. Is there anything that Facebook could be doing here to clamp down on the abuse of Messenger? So Facebook does a lot. They have a threat intel team that is dedicated
Starting point is 00:16:06 to solving problems like this. I think the recent use of legitimate platforms for these campaigns has been what's made it so challenging for them. So what they can do probably better for the user is education. This is certainly a question of tooling, but it's also a question of education for the user. Someone who has gone through some kind of phishing exercise or training is probably not going to click these links. But given that we've seen hundreds of millions of people click these links, that does not account for, you know, an overwhelming majority of Facebook users. So whether it's flagging links as, you know, you might not want to click this, educating users better on what scams might look like in Facebook Messenger, or cooperating more with these legitimate application service providers that are abused so frequently in Facebook, I think there are definitely things that can be done. But the use of legitimate web services presents a unique challenge to them that I'm sure has been difficult to tackle. And what about multi-factor authentication? I mean, I suppose that would slow down the abuse
Starting point is 00:17:12 of Messenger, but you're still going to find yourself redirected to all the ad sites, right? Yep. The adversary will still make money, but they will not be able to use your account to proliferate the attack. So the use of multi-factor authentication will do damage to the life cycle of the adversary's attack, but it certainly won't stop them from making money. So what are your recommendations then? I mean, for folks to best protect themselves against this, you mentioned education. What else is in play here? I think education for the users is obviously number one here. Knowing how to recognize a fake link or a suspicious link or a typo squatted or lookalike domain is incredibly important. But tooling is also important.
Starting point is 00:18:05 is when we run them through popular domain reputation scanning services, we're seeing these domains come back clean, despite being active phishing infrastructure and being suspicious in several ways. So I think it is also on domain reputation analysis engines and tooling which is supposed to be protecting users from visiting these links, which is failing the user in these cases, to improve the quality and integrity of their detections,
Starting point is 00:18:30 of whatever algorithmic functions they're using to determine the trustworthiness of a page. Because in an overwhelming majority of reputation analysis engines, we're seeing these domains pass the test because their parent domain is trusted, their content does not look suspicious, and sometimes they're waiting several seconds to actually load the Facebook login portal, and
Starting point is 00:18:49 they're loading like some innocuous page first to skirt detection by traditional domain reputation or DNS blocking tools. So the problem is definitely multifaceted and a combination of user education and improvements in tooling, both by Facebook and by domain reputation analysis services. Do we have any sense for who's behind this or what part of the world they're coming from? We trace this particular adversary back to Colombia, and we're cooperating with the FBI and Interpol in their investigation into the activity, which, as I said, still continues today. It's still a very active campaign. And we were able to do quite a bit of attribution because in the adversaries' early days of this campaign, particularly the beginning of 2022 and the end of 2021, they were relatively lazy from an operational security perspective. So within the
Starting point is 00:19:47 code, there were several comments indicating what website was used to generate this code. And by tracking down the owner of that particular website, which in this case, I mentioned earlier, Bender Crack Pro, this Facebook page, in the code on virtually all of these Facebook landing pages until about two weeks ago, there was a line that said in Spanish, developed for Bendercrack.com. Now, when we looked in the Wayback Machine at Bendercrack.com, we saw an inventoried copy of the page, an archived copy of the page, which contained the phone number of the administrator of the page. They said, sorry, we've been taken down due to copyright complaints, but here's where you can reach out to me. Using that phone number, we were able to connect it with several email addresses, which were used for different scam campaigns online,
Starting point is 00:20:36 and one which was associated with an individual who we tracked down to be offering several different hacking services and operating several illicit businesses online, mostly related to social media hacking services. Operational security has improved recently. They've removed parts of code that can be attributed directly to them, but just shy of two years, their name was almost directly associated with an overwhelming majority of the fake login portals that we found. I suppose it's worth mentioning too. I mean, it's, I don't know, personally, it's hard to have a tremendous amount of sympathy for the online advertisers,
Starting point is 00:21:16 but they're falling victim here as well. They think their message is being put in front of people when it's really not. They are, yeah. And so are the legitimate web application service providers. The advertisers are being duped by these adversaries and paying them out in large amounts. So the advertisers are losing money because these advertisements aren't legitimately landing
Starting point is 00:21:34 in front of a user. Only really one of them in the chain of redirects is. But also the application service providers that the user, the adversary is using to spin up these web pages are being abused. Their trust with these other platforms are being abused. And when you go into tools like urlscan.io and run through some of these parent domains, you see so much malicious activity associated with these quick web deploy services, which are offering a legitimate service to an overwhelming
Starting point is 00:22:06 majority of the internet, but are being in no small way abused by malicious actors online. Our thanks to Nick Ascoli from Fortrace for joining us. The research is titled Fishing Tactics, How a Threat Actor Stole One Million Credentials in Four Months. We'll have a link in the show notes. Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity.
Starting point is 00:22:46 That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default deny approach can keep your company safe and compliant. The Cyber Wire podcast is proudly produced in Maryland out of the startup studios of Data Tribe, where they're co-building the next generation of cybersecurity teams and technologies.
Starting point is 00:23:29 Our amazing Cyber Wire team is Rachel Gelfand, Liz Ervin, Elliot Peltzman, Trey Hester, Brandon Karpf, Eliana White, Puru Prakash, Justin Sabey, Tim Nodar, Joe Kerrigan, Carol Terrio, Ben Yellen, Nick Vilecki, Joe Kerrigan, Carole Terrio, Ben Yellen, Nick Vilecki, Gina Johnson, Bennett Moe, Chris Russell, John Petrick, Jennifer Iben, Rick Howard, Peter Kilpie, and I'm Dave Bittner. Thanks for listening. We'll see you back here next week.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.