Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 need help to dissect this fishing cimb site

views
     
TStaga
post Jul 25 2022, 04:37 AM, updated 4y ago

Getting Started
**
Junior Member
171 posts

Joined: Jan 2013
I would love if any interested sifu here to help me reverse-engineer this site. i've dig some digging myself, but think i might missed out some stuff.

the fishing link is

CODE

https://www dot cimb o licks dotcom/clicks/
http://103 dot 97.3 dot 130/clicks


see some of their php code snippet here:
CODE
hostname + /clicks/api/login/submit_username?username=suckerzzz&deviceId=lameaf


some facts?
- domain name went live ~ 2 weeks ago.
- attacker hosted from china/hongkong guangzhou region.
- coder probably cina mainlanders, judging from the cinis comment on their php code
- it may have geoblock too far countries like USA? this theory is not verified yet.
- the php first check for smartphone useragent, if you use browser, it will redirect to legit banking website without even loading a single byte of the spoof code (change ur useragent in devtools>more tools>network condition)
- attacker use websocket to sent back response to client after victim submit the username.
(reason behind this is i think is so attacker can relay the legit secureWord back to their fising site, high possibility that they manually validate the username. also it means got person manning behind the computer to do those validating stuff after they launch their fishing campaign via sms/whatsapp)
- i have no gone pass the enter password part because no response from the websocket after i submit the id. lol.



CODE

Domain Name: cimb o licks dot com
Registry Domain ID: 2710744632_DOMAIN_COM-VRSN
Registrar WHOIS Server: grs-whois.hichina.com
Registrar URL: http://wanwang.aliyun.com
Updated Date: 2022-07-13T17:06:01Z
Creation Date: 2022-07-13T17:06:00Z
Registrar Registration Expiration Date: 2023-07-13T17:06:00Z
Registrar: Alibaba Cloud Computing Ltd. d/b/a HiChina (www.net.cn)
Registrar IANA ID: 1599
Reseller:
Domain Status: clientHold https://icann.org/epp#clientHold
Domain Status: serverHold https://icann.org/epp#serverHold
Registrant City:
Registrant State/Province:
Registrant Country:
Registrant Email:https://whois.aliyun.com/whois/whoisForm
Registry Registrant ID: Not Available From Registry
Name Server: DNS25.HICHINA.COM
Name Server: DNS26.HICHINA.COM
DNSSEC: unsigned
Registrar Abuse Contact Email: email@service.aliyun.com
Registrar Abuse Contact Phone: +86.95187



thx

This post has been edited by taga: Jul 25 2022, 04:42 AM
silverhawk
post Jul 25 2022, 07:32 PM

Eyes on Target
Group Icon
Elite
4,956 posts

Joined: Jan 2003


QUOTE(taga @ Jul 25 2022, 04:37 AM)
- attacker use websocket to sent back response to client after victim submit the username.
(reason behind this is i think is so attacker can relay the legit secureWord back to their fising site, high possibility that they manually validate the username. also it means got person manning behind the computer to do those validating stuff after they launch their fishing campaign via sms/whatsapp)
Its china, so that is possible. What is more likely they have a headless browser running as a scrapper. It just has to load the website, then input the username and scrape for the word/image. This can even be done natively in windows 11 with power automate.

I remember someone saying in a programming facebook group that these words/images are a good way to prevent phishing, and I told them no it is not, and demo-ed this exact method of attack.




15cm
post Jul 25 2022, 09:26 PM

Casual
***
Junior Member
423 posts

Joined: Apr 2022
QUOTE(silverhawk @ Jul 25 2022, 07:32 PM)
Its china, so that is possible. What is more likely they have a headless browser running as a scrapper. It just has to load the website, then input the username and scrape for the word/image. This can even be done natively in windows 11 with power automate.

I remember someone saying in a programming facebook group that these words/images are a good way to prevent phishing, and I told them no it is not, and demo-ed this exact method of attack.
*
there are hundred thousands users...they gonna scrap all of it?
silverhawk
post Jul 25 2022, 11:17 PM

Eyes on Target
Group Icon
Elite
4,956 posts

Joined: Jan 2003


QUOTE(15cm @ Jul 25 2022, 09:26 PM)
there are hundred thousands users...they gonna scrap all of it?
*
Don't need to scrap all, just when the user types in their username. Phishing site sends the username to their headless browser. Headless browser runs and inputs the username on actual website. Actual website shows the image/text. headless browser scraps it, and returns it to the phishing site.

So to the user will see their image/text on the phishing site as though its real. Basically the "security feature" is easily hijacked and now the user has a false sense of security on a compromised page.

Banks actually have a lot of horrible security practices that are more theatre than actual security.
angch
post Jul 26 2022, 10:19 AM

On my way
****
Junior Member
636 posts

Joined: Jul 2006
Just FYI, this is the phishing SMS others apparently received.

user posted image


They don't need to scrape. But in this case, the person had already clicked it and entered his/her/their username.

Anyway, advised them to change password already.

FYI, shodan.io has more info on the IP address. They're running a very China based app server for PHP (workerman).

Have fun.
15cm
post Jul 26 2022, 05:11 PM

Casual
***
Junior Member
423 posts

Joined: Apr 2022
QUOTE(angch @ Jul 26 2022, 10:19 AM)
Just FYI, this is the phishing SMS others apparently received.

user posted image
They don't need to scrape. But in this case, the person had already clicked it and entered his/her/their username.

Anyway, advised them to change password already.

FYI, shodan.io has more info on the IP address. They're running a very China based app server for PHP (workerman).

Have fun.
*
lmao, the grammatical error, and the occasional caps... biggrin.gif
FlierMate1
post Jul 26 2022, 07:31 PM

Getting Started
**
Validating
139 posts

Joined: Jun 2022
Oh my gosh, what happens to CIMB, this is another fake one: https://www.clickocimb.xyz/

user posted image
angch
post Jul 27 2022, 09:57 AM

On my way
****
Junior Member
636 posts

Joined: Jul 2006
Oi, stop blaming CIMB for people pretending to be CIMB.
FlierMate11
post Nov 1 2022, 09:32 PM

New Member
*
Validating
17 posts

Joined: Oct 2022
QUOTE(angch @ Jul 27 2022, 09:57 AM)
Oi, stop blaming CIMB for people pretending to be CIMB.
*
Both fraudulent "CIMB" websites above have been took down, cannot be opened anymore.

Thanks goodness.

 

Change to:
| Lo-Fi Version
0.0209sec    0.92    5 queries    GZIP Disabled
Time is now: 24th December 2025 - 05:02 PM