fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Clever Phishing Scam Targets Websites With Free DNSSEC Offer

Clever Phishing Scam Targets Websites With Free DNSSEC Offer

A very clever phishing campaign targets bloggers and website owners with emails pretending to be from their hosting provider who wants to upgrade their domain to use secure DNS (DNSSEC).

As it’s possible to determine who is hosting a domain for a website via the WHOIS records, IP addresses, and HTTP headers, the email scam is highly targeted and impersonates the specific hosting company used by a website.

In a new report by Sophos, researchers explain how the scammers are using this WHOIS information to send targeted emails that impersonate WordPress, NameCheap, HostGator, Microsoft Azure, and other well-known hosting companies.

The security company was first alerted to this scam when they received the phishing scam pretending to be WordPress, who hosts their NakedSecurity blog.

Phishing email sent to website owners
Source: Sophos

Domain Name System (DNS) is the technology that is analogous to a real-world “phone book.” It maps and resolves the memorable domain names such as bleepingcomputer.com into the corresponding IP address of the server (in this case, 104.20.59.209), where the website is hosted.

There is a newer protocol, DNSSEC, that exists to provide extra security to DNS queries and responses. This feature is typically implemented as a safeguard by domain hosting providers to prevent DNS data from being tampered.

These phishing emails state that the website’s DNS provider will be upgrading their DNS to secure DNS (DNSSEC), but need them to click on a link to activate this enhanced security feature.

Sophos’ report explains that DNSSEC is not something website owners would typically setup on their own.

“You’ve probably never set up DNSSEC or used it directly yourself because it has typically been a feature used by service providers to help to keep their DNS databases intact when they exchange data with other DNS servers,” the report explained.

Considering most independent bloggers and webmasters would seldom have a reason to look into DNSSEC, the spammers exploit their curiosity and fear through this campaign.

Once the malicious links in the email are clicked, a “surprisingly believable” Update Assistant page is generated on the fly. 

Fake WordPress Update Assistant landing page
Source: Sophos

Of interest, is that these pages are dynamically generated based on the base64-encoded GET parameters in the URL. These parameters instruct the backend to render the page with the appropriate website name, logo, and the URL of the client website.

For example, the link within the phishing email Sophos team received, had the base64 encoded “banner” parameter set to WordPress, which is their hosting provider, and the “URL” set to base64-equivalent of “nakedsecurity.sophos.com”

Also read: Cost of GDPR Compliance for Singapore Companies

The Sophos team further demonstrated how they could simply alter these two parameters, and new pages would be generated on the fly to impersonate different hosting providers.

Modifying URL parameters to generate different scams


As the attackers forgot to turn off directory indexing on their malicious phishing domain, Sophos could see all the logos of different hosting providers they had hosted on their server.

Impersonated hosting companies

Some prominent names of hosting companies impersonated include HostGator, HostMonster, KonaKart, Linode, Magento, Microsoft Azure, NameCheap, and Network Solutions.

The goal of this phishing campaign is to steal credentials from unsuspecting users rather than offering them any legitimate DNSSEC protection service.

Once the user enters their credentials, the malicious website pretends to kick off a series of installation and “update” sequences, using bogus AJAX-style loaders and popup alerts, imitating an installation. 

Users are told that once the update completes, they will be redirected to their website. But this doesn’t happen, perhaps due to a programming error on the scammers’ part.

“As you can see, the crooks claim that you’ll be redirected to your own site at the end of the process, but instead you end up at a URL that includes the name of your site preceded by the name of the fake site set up by the crooks. This produces a 404 error – what we can’t tell you is whether the crooks made a programming blunder and accidentally redirected you to https://[THEIRDOMAIN]/your.example instead of directly to https://your.example or whether they intended this all along, to avoid redirecting to you directly to your own login page, which might seem suspicious given that you put in your username and password already,” Sophos states in their report.

As a general rule, to safeguard against scams like these, email recipients should be mindful of the links they click in an email and especially when entering their credentials on unfamiliar sites and systems.

Enabling two-factor authentication can also help deter phishing attacks that attempt to steal login credentials.

Also read: 6 Simple Tips on Cyber Safety at Home

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us