Skip to content
Weekly Geek
  • Comics
  • Film
  • SciFi
  • Sports
  • Tech
  • TV
  • Video Games
  • Wrestling

Phishing scam had all the bells and whistles—except for one

By TheGeek | January 21, 2021
0 Comment
Extreme closeup of laptop monitor.
Enlarge / The query window for username and password on a webpage can be seen on the monitor of a laptop.

reader comments

10 with 8 posters participating

Share this story

Criminals behind a recent phishing scam had assembled all the important pieces. Malware that bypassed antivirus—check. An email template that got around Microsoft Office 365 Advanced Threat Protection—check. A supply of email accounts with strong reputations from which to send scam mails—check.

It was a recipe that allowed the scammers to steal more than 1,000 corporate employee credentials. There was just one problem: the scammers stashed their hard-won passwords on public servers where anyone—including search engines—could (and did) index them.

“Interestingly, due to a simple mistake in their attack chain, the attackers behind the phishing campaign exposed the credentials they had stolen to the public Internet, across dozens of drop-zone servers used by the attackers,” researchers from security firm Check Point wrote in a post published Thursday. “With a simple Google search, anyone could have found the password to one of the compromised, stolen email addresses: a gift to every opportunistic attacker.”

Check Point researchers found the haul as they investigated a phishing campaign that began in August. The scam arrived in emails that purported to come from Xerox or Xeros. The emails were sent by addresses that, prior to being hijacked, had high reputational scores that bypass many antispam and antiphishing defenses. Attached to the messages was a malicious HTML file that didn’t trigger any of the 60 most-used antimalware engines.

The email looked like this:

Check Point

Once clicked, the HTML file displayed a document that looked like this:

Advertisement
Check Point

When recipients were fooled and logged into a fake account, the scammers stored the credentials on dozens of WordPress websites that had been compromised and turned into so-called drop-zones. The arrangement made sense since the compromised sites were likely to have a higher reputational score than would be the case for sites owned by the attackers.

The attackers, however, failed to designate the sites as off-limits to Google and other search engines. As a result, Web searches were able to locate the data and lead security researchers to the cache of compromised credentials.

“We found that once the users’ information was sent to the drop-zone servers, the data was saved in a publicly visible file that was indexable by Google,” Thursday’s post from Check Point read. “This allowed anyone access to the stolen email address credentials with a simple Google search.”

Based on the analysis of roughly 500 of the compromised credentials, Check Point was able to compile the following breakdown of the industries targeted.

Simple Web searches show that some of the data stashed on the drop-zone servers remained searchable at the time this post was going live. Most of these passwords followed the same format, making it possible that the credentials didn’t belong to real-world accounts. Check Point’s discovery, however, is a reminder that, like so many other things on the Internet, stolen passwords are ripe for the picking.

Source

Category: Tech Tags: account credentials, Biz & IT, phishing, privacy, scams
Post navigation
← Ars Technicast special edition, part 1: The Internet of Things goes to war Every Announcement From Today’s Resident Evil Showcase →

Recent Posts

  • College Football Playoff: Revised 12-team seeding next step toward postseason perfection
  • MLB writer floats Dodgers-Pirates trade to bring Paul Skenes to LA in 7-player stunner
  • Report calls for regulation of “legally and ethically flawed” VMware
  • New Claude 4 AI model refactored code for 7 hours straight
  • Adam Schefter predicts ending for Aaron Rodgers-Steelers drama with specific timeline

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020

Categories

  • Books
  • Comics
  • Film
  • SciFi
  • Sports
  • Tech
  • TV
  • Uncategorized
  • Video Games
  • Wrestling
custom footer text left
custom footer text right
Iconic One Theme | Powered by Wordpress