Just this morning alone I have received two specially crafted scam emails from cyber criminals targeting unsuspecting Nigerians (mostly those that have bank accounts). I must say I am impressed!
I almost fell for this scam email even with my years of Information Security Research and Ethical Hacking. The reasons I almost fell for this scam are simply because.
- I am a UBA customer and I use their prepaid card for online transactions.
- The from name is [email protected] ( not the actual email address but the name of the sender).
- The email is properly formatted.
- The real Url is masked under http://www.ibank.ubagroup.com/BVN(Here is the real URL masked http://ow.ly/XUJAM).
- The User interface is almost like the real one.
When I clicked on the URL It took to this fake website below.
Here is the original Website with Https Secured and green-coloured padlock.
Nigerian cyber criminals are upping their game everyday and getting sophisticated with new tools and technologies to aid their operations.
First this email contains an ow.ly link that redirects twice before reaching the final destination.
Be the smartest in the room
The first redirect was to this hacked website “http://www.freeskyaerospace.com/wp-content/themes/Hereisworld/fontawesome/less/spcsless.php”
Here is the first hacked website showing the directory. Here we can see the spcsless.php file that now redirects to another website.
The other website that users were redirected to was http://wallpapersandpics.com/sitemap/style/css/AuthenticationController2f8a.html if we check the directory we would see that the website has been hacked.
This later redirected to a base64 encoded data URI which loads the webpage on the victim’s system so no matter if all the websites involved are taken down the final website resides on the victim’s page.
Once you finally login to the website it asks shows this page asking users to enter their security questions including their token.
Even after users fill in their details it takes them to this next page asking for their token. No matter how many times users enter their token it keeps showing an error message.
If the Bank token is actually Time-based One-time Password Algorithm (TOTP) then I believe the attacker would be getting this data over an instant protocol like XMPP or IRC. If this is the case then I believe this is an organized cyber crime.
I was able to quickly report the fake ow.ly link to HootSuite and they have quickly taken down the suspicious link.
Further digging up on the SPF records for udirect.com I was amazed that no single spf records was in place. This means anyone can spoof the email address and send an email on behalf Udirect.com.
If a domain publishes an SPF record, spammers and phishers are less likely to forge e-mails pretending to be from that domain, because the forged e-mails are more likely to be caught in spam filters which check the SPF record. Therefore, an SPF-protected domain is less attractive to spammers and phishers. Because an SPF-protected domain is less attractive as a spoofed address, it is less likely to be blacklisted by spam filters and so ultimately the legitimate e-mail from the domain is more likely to get through.
I was able to report the link and successfully shut down that particular campaign but there are hundreds of thousands of spam emails being sent every day and more people are falling into scams. There is little that individuals like me can do. I hope more organizations would really take information security very serious.
I currently work as the Digital Security Lead at CcHub and working on an Osiwa project to help CSO's, Journalist, Active Citizens and bloggers protect themselves from Digital Security threats.
You can tweet at me if you want to find more about the project or want to be involved.
Originally published on Temitayo's Medium.