<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Huskyscripts Blog - Threat Research]]></title><description><![CDATA[Adversary Research and Hunting One at a Time]]></description><link>https://huskyscripts.blog</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1741359889988/60b82c3e-a4fb-424a-ba2e-bec816ca6950.png</url><title>Huskyscripts Blog - Threat Research</title><link>https://huskyscripts.blog</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 10:34:45 GMT</lastBuildDate><atom:link href="https://huskyscripts.blog/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Tracking Adversary Infrastructure with ValidIn and URLScan.io]]></title><description><![CDATA[In this post, I want to share some threat hunting techniques I’ve honed over time while investigating adversary infrastructure using crowdsourced and freemium tools.
While enterprise tools are powerful, you don't always need a massive budget to find ...]]></description><link>https://huskyscripts.blog/budget-threat-hunting-tracking-adversary-infrastructure-with-validin-and-urlscanio</link><guid isPermaLink="true">https://huskyscripts.blog/budget-threat-hunting-tracking-adversary-infrastructure-with-validin-and-urlscanio</guid><category><![CDATA[phishing]]></category><category><![CDATA[adversarial attack]]></category><category><![CDATA[threat intelligence]]></category><category><![CDATA[ThreatDetection]]></category><dc:creator><![CDATA[thebitdoodler]]></dc:creator><pubDate>Thu, 27 Nov 2025 22:06:37 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764314511297/918c6522-64fa-46e0-9268-3d793ecacea9.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post, I want to share some threat hunting techniques I’ve honed over time while investigating adversary infrastructure using crowdsourced and freemium tools.</p>
<p>While enterprise tools are powerful, you don't always need a massive budget to find evil. I heavily rely on open-source intelligence (OSINT) to find correlations and context for ongoing phishing campaigns. This guide is designed for beginners or anyone seeking to enhance their pivot skills without incurring significant costs.</p>
<blockquote>
<p><strong>Disclaimer</strong>: These techniques were developed through random OSINT research to understand infrastructure correlations. The goal here is to demonstrate the <em>methodology</em> of pivoting.</p>
</blockquote>
<p>This blog may appeal to individuals who rely heavily on crowd-sourced feed sources for threat hunting, as well as to beginners in the field who prefer not to make significant investments at the start of their careers.</p>
<h3 id="heading-phase-1-the-spark-intelligence-led-hunting">Phase 1: The Spark( Intelligence-Led Hunting)</h3>
<p>My curiosity usually starts with reading research from the community. Recently, I was reading a Mandiant article titled <strong><em>Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines</em></strong>. It detailed the operations of <strong>Scattered Spider (UNC3944)</strong>, a financially motivated group known for aggressive social engineering.</p>
<p>If you are interested in learning about Scattered Spider’s modus operandi/TTPs, <a target="_blank" href="https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations">read here</a>.</p>
<p>One section caught my eye: the group's specific patterns for registering phishing domains. [Fig. 1]</p>
<hr />
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764267126630/ac52e707-02ab-4ff1-8f27-680c99cbd8e3.png" alt="Fig1" class="image--center mx-auto" /></p>
<hr />
<p><em>Fig. 1: Phishing Domain Registration Pattern mentioned in the blog</em></p>
<p>I became curious and attempted to search a database of newly registered domains that I had created and managed on my local machine over the previous two years. Similarly, I recall similar domain registration patterns last year that impersonated the "Okta" service and targeted multiple brands.</p>
<div data-node-type="callout">
<div data-node-type="callout-emoji">💡</div>
<div data-node-type="callout-text"><strong>Johannes Ullrich</strong>'s well-written script hack for quickly finding similar patterned domains inspired me to add a personal touch to my search.</div>
</div>

<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162">https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162</a></div>
<p> </p>
<h3 id="heading-the-hypothesis">The Hypothesis</h3>
<p>Based on Scattered Spider's history, they often use keywords like <code>help</code>, <code>vpn</code>, <code>sso</code>, and <code>servicenow</code>. However, given their recent campaigns targeting Salesforce customers, I hypothesized they might be shifting focus.</p>
<p>I searched my local NRD database for the keyword <strong>"salesforce"</strong>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764269059218/e41324af-8f48-4d6d-a7fc-8b55b9cf1ccf.png" alt class="image--center mx-auto" /></p>
<p>Out of four results, one stood out immediately. On <strong>November 22, 2025</strong>, the domain <code>salesforce-logs[.]com</code> was registered.</p>
<ul>
<li><p><strong>Hosting IP:</strong> <code>193.143.1.220</code></p>
</li>
<li><p><strong>ASN:</strong> AS198953 (PROTON66)</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764269407808/e2a0fde7-e4e3-4f69-b5c2-23f6a13e31e2.png" alt class="image--center mx-auto" /></p>
<p>This ASN is frequently associated with bulletproof hosting or malicious activity (Ref: <a target="_blank" href="https://threatfox.abuse.ch/asn/198953">ThreatFox</a>), which was my first red flag.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764269634676/148108b7-1d72-4777-82ee-73221ec43e4f.png" alt class="image--center mx-auto" /></p>
<p><em>Ref:</em> <a target="_blank" href="https://threatfox.abuse.ch/asn/198953"><em>https://threatfox.abuse.ch/asn/198953</em></a></p>
<h3 id="heading-phase-2-the-pivot-validin">Phase 2: The Pivot (Validin)</h3>
<p>Now that we have a suspicious indicator ( <code>salesforce-logs[.]com</code> ), we need to see how deep the rabbit hole goes. This is where <strong>ValidIn</strong> shines for correlating Passive DNS (pDNS) data.</p>
<p>Upon checking the IP <code>193.143.1.220</code> in ValidIn, I noticed a change in ownership around November 27, 2025. More importantly, the IP hosted a cluster of domains following a very specific theme. [Fig. 2]</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764270335954/bd2eedc3-7d57-495b-9a04-7a72fc527da4.png" alt class="image--center mx-auto" /></p>
<p><em>Fig. 2: Passive DNS of the IP</em></p>
<p>The adversary wasn't just targeting Salesforce; they were building infrastructure to impersonate <strong>email marketing automation</strong> platforms such as ActiveCampaign, SendGrid, MailerLite, and ConvertKit.</p>
<pre><code class="lang-plaintext">activecarnpaignes[.]com
activecarnpaigns[.]com
serdgrid[.]com
salesforce-logs[.]com
converts-kits[.]com
mailerlite-logs[.]com
</code></pre>
<p>Using ValidIn’s <strong>Lookalike</strong> feature and with the deduced pattern <code>*-logs.com</code> from the above cluster, the search revealed 24 similar domains, confirming a wider campaign targeting marketing tools:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764274929293/ceccb368-35f8-441b-842d-f5412eb5065d.png" alt class="image--center mx-auto" /></p>
<p>Fig. 3: Validin Lookalike Feature for *-log.com</p>
<pre><code class="lang-plaintext">mailjet-logs.com
mailchimp-logs.com
mailerlite-logs.com
</code></pre>
<p>At this stage, we have successfully mapped the <strong>infrastructure</strong>. We know <em>what</em> they are building, but we don't yet know <em>how</em> they are using it.</p>
<h3 id="heading-phase-3-the-context-urlscanio">Phase 3: The Context (URLScan.io)</h3>
<p>To understand the attack vector without touching the malicious infrastructure directly, we turn to <a target="_blank" href="http://URLScan.io"><strong>URLScan.io</strong></a>.</p>
<p>We searched for our original suspect: <code>salesforce-logs[.]com</code>.</p>
<h4 id="heading-the-evasion-red-flag">The "Evasion" Red Flag</h4>
<p>You might notice scans redirecting to <code>www.google.com</code>. This is a classic evasion technique. If the phishing kit detects a scanner or a bot (like URLScan's automated browser), it redirects to a benign site (Google) to hide the true phishing page.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764276258602/f08667fd-8b52-4052-bde8-ded98f02a6dd.png" alt class="image--center mx-auto" /></p>
<p><em>Fig. 4: Scans of salesforce-logs[.]com on URLScan</em></p>
<p>However, some scans succeeded. The results confirmed the domain was hosting a <strong>fake Salesforce Marketing Cloud login page</strong>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764276007211/4e303417-49e8-43b6-be37-88f1abeb94f0.png" alt class="image--center mx-auto" /></p>
<p>Whatever we suspected about the uncovered domains is now confirmed. Similarly, we can check individual domains.</p>
<p>In the below example for serdgrid[.]com we have identified the similar pattern, i.e., the phishing page hosted on a subdomain with <code>login</code> keyword.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764277373786/1e0ae3bb-4795-4632-8b6c-08723c88bbd1.png" alt class="image--center mx-auto" /></p>
<h4 id="heading-finding-the-delivery-vector">Finding the Delivery Vector</h4>
<p>How is this reaching victims? This is where the <strong>Redirects</strong> tab in URLScan is a goldmine.</p>
<p><strong>Most of the time, the Redirects tab in the URLScan tells us the story that we are looking for.</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764278219407/3afa5512-f4a1-4ca1-9b07-34faab9262dc.png" alt class="image--center mx-auto" /></p>
<p>By analysing the redirect chain for a related domain (<code>salesforce-logs[.]com</code>), we can reconstruct the narrative. The scan data showed the link was likely delivered via a "Trailhead Account Verification" lure.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764278641382/9beddce3-b72d-4c7e-b4c0-54eb4c4b5cce.png" alt class="image--center mx-auto" /></p>
<p><em>Fig. 5: Inspecting</em> <strong><em>Redirects</em></strong> <em>section from</em> <a target="_blank" href="https://urlscan.io/result/019abb84-428a-77e4-9374-e2707f86f497/#redirects"><em>URLScan</em></a></p>
<p>Similarly, <code>serdgrid[.]com</code> was used to create a fake scenario claiming a "SendGrid API Key was paused due to violations." This creates urgency—a classic social engineering tactic to encourage the user to click and "log in" to the fake platform.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764279246977/e21d3af9-5b97-43c9-a46f-d0f10348475a.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-conclusion">Conclusion</h3>
<p>In this hunt, we focused heavily on <strong>Passive DNS</strong> and <strong>Lookalike Domains</strong>. These are powerful <em>Indicators of Future Attack (IOFA)</em>—breadcrumbs the adversary leaves behind while building their infrastructure <em>before</em> they launch the first phishing email.</p>
<p>You don't need a million-dollar budget to start. You only need curiosity, a few bookmarkable tools, and the patience to follow the thread when you notice something unusual.</p>
<p>Start with a keyword. Pivot on the IP. Verify the intent. Happy hunting!</p>
]]></content:encoded></item><item><title><![CDATA[Job Phishing Campaign Targeting Meta, WhatsApp & Instagram]]></title><description><![CDATA[Summary
The recent surge in job phishing campaigns targeting major platforms like Meta, WhatsApp, and Instagram has raised significant concerns recently. By analysing newly registered domains with keywords such as hire, apply and wajob a pattern of f...]]></description><link>https://huskyscripts.blog/job-phishing-campaign-targeting-meta-whatsapp-and-instagram</link><guid isPermaLink="true">https://huskyscripts.blog/job-phishing-campaign-targeting-meta-whatsapp-and-instagram</guid><category><![CDATA[phishing]]></category><category><![CDATA[job scam]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[CybersecurityAwareness]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[thebitdoodler]]></dc:creator><pubDate>Mon, 28 Apr 2025 11:17:48 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/ZYLmudR28SA/upload/e2d907f7d1b8746979b8a9e38e36c044.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-summary">Summary</h3>
<p>The recent surge in job phishing campaigns targeting major platforms like Meta, WhatsApp, and Instagram has raised significant concerns recently. By analysing newly registered domains with keywords such as <code>hire</code>, <code>apply</code> and <code>wajob</code> a pattern of fraudulent activity has been uncovered. These domains, which began appearing in late 2024, are part of a coordinated effort to deceive job seekers by imitating legitimate recruitment processes.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745835683836/8e2ae614-0d05-440c-a06b-b061f813e84d.png" alt class="image--center mx-auto" /></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Domain</td><td>Registered</td><td>Expiry</td><td>Registrar Name</td></tr>
</thead>
<tbody>
<tr>
<td><a target="_blank" href="http://wahiringsolutionss.com">wahiringsolutionss.com</a></td><td>2024-11-30 06:00:13+00:00</td><td>2025-11-30 06:00:13+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengertalentsearch.com">messengertalentsearch.com</a></td><td>2025-03-06 17:21:07+00:00</td><td>2026-03-06 17:21:07+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wajobready.com">wajobready.com</a></td><td>2024-12-02 05:05:19+00:00</td><td>2025-12-02 05:05:19+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wa-employerspace.com">wa-employerspace.com</a></td><td>2025-03-22 15:46:22+00:00</td><td>2026-03-22 15:46:22+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wahirelinks.com">wahirelinks.com</a></td><td>2024-12-02 05:05:06+00:00</td><td>2025-12-02 05:05:06+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wa-employernet.com">wa-employernet.com</a></td><td>2025-03-22 15:14:50+00:00</td><td>2026-03-22 15:14:50+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wajobopener.com">wajobopener.com</a></td><td>2024-12-02 04:52:10+00:00</td><td>2025-12-02 04:52:10+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wa-hrmatch.com">wa-hrmatch.com</a></td><td>2025-03-22 15:46:26+00:00</td><td>2026-03-22 15:46:26+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-waexpert.com">apply-waexpert.com</a></td><td>2025-03-31 19:02:57+00:00</td><td>2026-03-31 19:02:57+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-waemployee.com">apply-waemployee.com</a></td><td>2025-03-31 19:02:49+00:00</td><td>2026-03-31 19:02:49+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-wacareer.com">apply-wacareer.com</a></td><td>2025-03-31 19:02:43+00:00</td><td>2026-03-31 19:02:43+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengerhrnetwork.com">messengerhrnetwork.com</a></td><td>2025-03-27 16:21:11+00:00</td><td>2026-03-27 16:21:11+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengercareerspot.com">messengercareerspot.com</a></td><td>2025-03-27 16:21:07+00:00</td><td>2026-03-27 16:21:07+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-talentspot.com">messenger-talentspot.com</a></td><td>2025-03-27 16:21:02+00:00</td><td>2026-03-27 16:21:02+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-talentpool.com">messenger-talentpool.com</a></td><td>2025-03-27 16:20:58+00:00</td><td>2026-03-27 16:20:58+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-talentlink.com">messenger-talentlink.com</a></td><td>2025-03-27 16:20:53+00:00</td><td>2026-03-27 16:20:53+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-headhunt.com">messenger-headhunt.com</a></td><td>2025-03-27 16:20:48+00:00</td><td>2026-03-27 16:20:48+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-careerlink.com">messenger-careerlink.com</a></td><td>2025-03-27 16:20:43+00:00</td><td>2026-03-27 16:20:43+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-careerfinder.com">messenger-careerfinder.com</a></td><td>2025-03-27 16:20:38+00:00</td><td>2026-03-27 16:20:38+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-careerboost.com">messenger-careerboost.com</a></td><td>2025-03-27 16:20:32+00:00</td><td>2026-03-27 16:20:32+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-wawork.com">apply-wawork.com</a></td><td>2025-03-26 18:12:31+00:00</td><td>2026-03-26 18:12:31+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-watalent.com">apply-watalent.com</a></td><td>2025-03-26 18:12:27+00:00</td><td>2026-03-26 18:12:27+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-wastaffing.com">apply-wastaffing.com</a></td><td>2025-03-26 18:12:24+00:00</td><td>2026-03-26 18:12:24+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-warecruit.com">apply-warecruit.com</a></td><td>2025-03-26 18:12:18+00:00</td><td>2026-03-26 18:12:18+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-wajobs.com">apply-wajobs.com</a></td><td>2025-03-26 18:12:13+00:00</td><td>2026-03-26 18:12:13+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-wahiring.com">apply-wahiring.com</a></td><td>2025-03-26 18:12:04+00:00</td><td>2026-03-26 18:12:04+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://apply-wacareers.com">apply-wacareers.com</a></td><td>2025-03-26 18:11:59+00:00</td><td>2026-03-26 18:11:59+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://schedule-watalent.com">schedule-watalent.com</a></td><td>2025-03-24 22:47:03+00:00</td><td>2026-03-24 22:47:03+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://schedule-wastaffing.com">schedule-wastaffing.com</a></td><td>2025-03-24 22:47:00+00:00</td><td>2026-03-24 22:47:00+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://schedule-wahiring.com">schedule-wahiring.com</a></td><td>2025-03-24 22:46:55+00:00</td><td>2026-03-24 22:46:55+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://schedule-wacareer.com">schedule-wacareer.com</a></td><td>2025-03-24 22:46:52+00:00</td><td>2026-03-24 22:46:52+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wa-hrmatchmaker.com">wa-hrmatchmaker.com</a></td><td>2025-03-22 15:46:30+00:00</td><td>2026-03-22 15:46:30+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wa-workmatchpro.com">wa-workmatchpro.com</a></td><td>2025-03-22 15:15:07+00:00</td><td>2026-03-22 15:15:07+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wa-recruiterpro.com">wa-recruiterpro.com</a></td><td>2025-03-22 15:14:59+00:00</td><td>2026-03-22 15:14:59+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengerworkfinder.com">messengerworkfinder.com</a></td><td>2025-03-19 14:26:44+00:00</td><td>2026-03-19 14:26:44+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengercareeradvice.com">messengercareeradvice.com</a></td><td>2025-03-19 14:26:39+00:00</td><td>2026-03-19 14:26:39+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-jobseekers.com">messenger-jobseekers.com</a></td><td>2025-03-19 14:26:35+00:00</td><td>2026-03-19 14:26:35+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-jobconnect.com">messenger-jobconnect.com</a></td><td>2025-03-19 14:26:31+00:00</td><td>2026-03-19 14:26:31+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-careerpath.com">messenger-careerpath.com</a></td><td>2025-03-19 14:26:25+00:00</td><td>2026-03-19 14:26:25+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-hirenow.com">messenger-hirenow.com</a></td><td>2025-03-14 15:06:37+00:00</td><td>2026-03-14 15:06:37+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-jobsolutions.com">messenger-jobsolutions.com</a></td><td>2025-03-14 14:26:42+00:00</td><td>2026-03-14 14:26:42+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-jobportal.com">messenger-jobportal.com</a></td><td>2025-03-14 14:18:01+00:00</td><td>2026-03-14 14:18:01+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-recruiter.com">messenger-recruiter.com</a></td><td>2025-03-14 14:10:14+00:00</td><td>2026-03-14 14:10:14+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-careering.com">messenger-careering.com</a></td><td>2025-03-14 13:49:41+00:00</td><td>2026-03-14 13:49:41+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messenger-hiring.com">messenger-hiring.com</a></td><td>2025-03-14 13:39:11+00:00</td><td>2026-03-14 13:39:11+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengertalenthub.com">messengertalenthub.com</a></td><td>2025-03-06 17:21:02+00:00</td><td>2026-03-06 17:21:02+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://messengerhiretalent.com">messengerhiretalent.com</a></td><td>2025-03-06 17:20:54+00:00</td><td>2026-03-06 17:20:54+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://waworkready.com">waworkready.com</a></td><td>2024-11-30 05:34:46+00:00</td><td>2025-11-30 05:34:46+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://waworkmatch.com">waworkmatch.com</a></td><td>2024-11-30 05:34:41+00:00</td><td>2025-11-30 05:34:41+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://waexperrts.com">waexperrts.com</a></td><td>2024-11-30 05:34:33+00:00</td><td>2025-11-30 05:34:33+00:00</td><td>Ultahost, Inc.</td></tr>
<tr>
<td><a target="_blank" href="http://wacareersgrowth.com">wacareersgrowth.com</a></td><td>2024-11-30 05:34:28+00:00</td><td>2025-11-30 05:34:28+00:00</td><td>Ultahost, Inc.</td></tr>
</tbody>
</table>
</div><p>Based on the similarity of such pages it is likely to be associated with the same phishing kit with page title as <code>Meta Pro Support: Facebook and Instagram</code> and <code>Meta</code> .</p>
<p><img src="https://pbs.twimg.com/media/GpnOq3Sb0AExwrc?format=jpg&amp;name=4096x4096" alt="Image" /></p>
<p><img src="https://pbs.twimg.com/media/GpnOyTzaUAAdDQT?format=jpg&amp;name=4096x4096" alt="Image" /></p>
<p>Another interesting fact of this domains are being registered on Ultahost, Inc.(<a target="_blank" href="https://ultahost.com/">https://ultahost.com/</a>) and most of the historical domains with similar patterns and live domains are hosted on IP address: <strong>160.30.169</strong>[.]<strong>150</strong> belongs to <a target="_blank" href="http://caohoanghai.store">Cao Hoang Hai Technology Company Limited</a>(AS152983), a less popular stub AS.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745834499252/ed18ce47-ac1a-4d2f-9674-be07566e524e.png" alt="http://caohoanghai.store/ screenshot" class="image--center mx-auto" /></p>
<h3 id="heading-stealing-facebook-credentials">Stealing Facebook Credentials</h3>
<p>All of the phishing sites are designed to steal credentials or personally identifiable information (PII) from victims, either through the registration page or the login page.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745837141020/c642530a-dbbe-4c16-8e04-40e9616c9e18.png" alt class="image--center mx-auto" /></p>
<p>By utilizing the websocket, the threat actor behind this campaign can track specific victim sessions, making it easier to intercept OTP/2FA codes, which have short validity periods.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745837567547/cf2a73dd-1531-401a-97c1-cf4e4de0d61c.png" alt class="image--center mx-auto" /></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745837340735/542370e8-de48-4409-aa1c-3df3d4c0e8d4.png" alt class="image--center mx-auto" /></p>
<p>The domain under attack, <mark>spyder1279[.]blog</mark>, was registered in March of this year and is used for WebSocket communication with phishing sites. A quick passive DNS analysis of the IP address <strong><mark>173.46.80[.]222</mark></strong> reveals that two other domains(adevsoftinc[.]com &amp; datacenterprocessing[.]com) are associated with it, likely owned by the threat actor.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1745838472776/603dca2a-33c9-48a6-9323-61b28600b5c9.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-conclusion">Conclusion</h3>
<p>This targeted phishing campaign represents a sophisticated and coordinated effort to exploit job seekers' trust in established platforms like Meta, WhatsApp, and Instagram. The registration of domains through a single registrar (Ultahost, Inc.) and their consistent hosting on infrastructure linked to Cao Hoang Hai Technology Company Limited (AS152983) it is likely a well-organized operation rather than disparate opportunistic campaigns.</p>
<p>Several key observations warrant attention from the cybersecurity community:</p>
<ol>
<li><p><strong>Pattern Recognition</strong>: The domain naming conventions consistently leverage trusted brand names (WhatsApp, Messenger) combined with employment-related terms (talent, career, hiring). This deliberate approach exploits the current job market anxiety and candidates' eagerness to find opportunities with prestigious companies.</p>
</li>
<li><p><strong>Infrastructure Insights</strong>: The concentration of domains on a less popular stub AS and consistent use of the same registrar provides valuable indicators for detection and blocking. The shared infrastructure connecting the phishing sites to <a target="_blank" href="http://spyder1279.blog">spyder1279.blog</a> via WebSocket for real-time credential interception demonstrates technical sophistication beyond basic phishing operations.</p>
</li>
<li><p><strong>Evolving Tactics</strong>: The implementation of WebSocket technology to track victim sessions and intercept time-sensitive OTP/2FA codes represents an advanced capability that significantly increases the threat actor's success rate against even security-conscious victims.</p>
</li>
</ol>
<h3 id="heading-community-note">Community Note</h3>
<ul>
<li><p>Implement domain blocking for the identified patterns, particularly those featuring combinations of "wa," "messenger," "apply," "hire," and "job" with recently registered domains</p>
</li>
<li><p>Monitor for traffic to the identified command-and-control domains, especially <mark>spyder1279.blog</mark>, <mark>adevsoftinc.com, and datacenterprocessing.com </mark> for further activities or associations</p>
</li>
</ul>
<p><em><mark>This research will be updated as new information becomes available.</mark></em></p>
]]></content:encoded></item><item><title><![CDATA[How to Hunt Phishing Campaigns in the Wild Without Analyzing Any Phishing Kit]]></title><description><![CDATA[Introduction
There are various ways to detect phishing campaigns. By monitoring the certificate transparency logs and based on typosquatting domain names[based on a brand-specific keyword] in the domains from the logs, sometimes we can co-relate phis...]]></description><link>https://huskyscripts.blog/hunting-phishing-campaigns-in-the-wild-without-phishing-kit</link><guid isPermaLink="true">https://huskyscripts.blog/hunting-phishing-campaigns-in-the-wild-without-phishing-kit</guid><category><![CDATA[phishingkit]]></category><category><![CDATA[phishing]]></category><category><![CDATA[threat intelligence]]></category><category><![CDATA[ThreatDetection]]></category><dc:creator><![CDATA[thebitdoodler]]></dc:creator><pubDate>Tue, 10 Sep 2024 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741361139252/cd90189c-bd51-4e87-950d-6815ce0070d4.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction"><strong>Introduction</strong></h2>
<p>There are various ways to detect phishing campaigns. By monitoring the <a target="_blank" href="https://certstream.calidog.io/">certificate transparency logs</a> and based on typosquatting domain names[based on a brand-specific keyword] in the domains from the logs, sometimes we can co-relate phishing sites based on the <em>Site Title</em>, <em>Rendered Text</em>, or <em>Screenshot</em> similarities (<a target="_blank" href="https://pyimagesearch.com/2017/11/27/image-hashing-opencv-python/">computer vision hash</a>). But in this blog, I will talk about how we can also find similar phishing sites for ongoing phishing campaigns with the help of the unique filenames used.</p>
<blockquote>
<p><cite>This process might not be the standered way to detect asimilar phishing sites for some specific instances . It is advised you can always improvise your detection techniques/methods based on the situation!</cite></p>
</blockquote>
<h2 id="heading-finding-an-active-phishing-link"><strong>Finding an Active Phishing Link</strong></h2>
<p>All we need is an active phishing link before we hunt down the ongoing phishing campaign associated with the phishing site. We can get active phishing kits through Twitter searches and various open-source data feeds.</p>
<h3 id="heading-twitter-searches"><strong>Twitter Searches</strong></h3>
<p>Getting active and recent phishing URLs from Twitter searches is easy. For example, we can go to <code>twitter.com &gt; Explore</code> and search the following hashtags: <a target="_blank" href="https://twitter.com/search?q=%23phishing&amp;src=typed_query&amp;f=top">#phishing</a> / <a target="_blank" href="https://twitter.com/search?q=%23phishingurl&amp;src=typed_query&amp;f=top">#phishingurl</a> / <a target="_blank" href="https://twitter.com/search?q=%23scam&amp;src=typed_query&amp;f=top">#scam</a>, or simply search those mentioned keywords without the hashtags.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/phishing_twitter.png" alt class="image--center mx-auto" /></p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/phishing_url_twitter-1.png" alt class="image--center mx-auto" /></p>
<p>Also, the infosec community has awesome folks who help by tweeting the newly detected phishing URLs to the community. We can grab any active phishing links from their Twitter feeds. Following is the list of the Twitter accounts:</p>
<ul>
<li><p><a target="_blank" href="https://twitter.com/noladefense">@noladefense</a></p>
</li>
<li><p><a target="_blank" href="https://twitter.com/PhishKitTracker">@PhishKitTracker</a></p>
</li>
<li><p><a target="_blank" href="https://twitter.com/JCyberSec_">@JCyberSec_</a></p>
</li>
</ul>
<h3 id="heading-open-data-feeds"><strong>Open Data Feeds</strong></h3>
<p>We can also collect the active phishing URL from any one of the following data feeds:</p>
<ul>
<li><p><a target="_blank" href="https://phishtank.org/">PhishTank</a></p>
</li>
<li><p><a target="_blank" href="https://tweetfeed.live/">TweetFeed</a></p>
</li>
<li><p><a target="_blank" href="https://openphish.com/">OpenPhish</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/mitchellkrogza/Phishing.Database">Phishing.Database</a></p>
</li>
<li><p><a target="_blank" href="https://www.threatminer.org/">ThreatMiner</a></p>
</li>
</ul>
<h2 id="heading-lets-the-hunt-begin"><strong>Let’s the Hunt Begin</strong></h2>
<p>I have found one interesting phishing site from <em>Noladefense( Unfortunately the account got suspended)</em></p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://twitter.com/noladefense/status/1760222479279153536">https://twitter.com/noladefense/status/1760222479279153536</a></div>
<p> </p>
<p>Noladefense Tweet of Phishing Site</p>
<p>The phishing domains <code>365-irlnotification[.]com</code> is impersonating the login page of the <strong>Bank of Netherlands,</strong> which is definitely to steal the credentials from their customers.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/image-1.png" alt class="image--center mx-auto" /></p>
<blockquote>
<hr />
<p><cite>Interestingly this phishing website is using cookies and google analystics to track the victim’s acitivity which is not new. So, I don’t want to distract myself by digging deep about the functionality of this phishing website.</cite></p>
</blockquote>
<h3 id="heading-find-the-unique-assetfilename-of-the-phishing-websites"><strong>Find the Unique Asset/Filename of the Phishing Websites</strong></h3>
<p>There are ways you can find out the file/assets are being used by any website, but the only straightforward way to open the Developer Tool[<code>ctrl+shift+i</code>] and go to the <code>network tab</code>. This way, we can find the names of the resources while loading the website in the browser.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/image-2-1024x616.png" alt class="image--center mx-auto" /></p>
<p>Following the process above, while loading the phishing site in the browser[chromium-based], we will get the filenames. Identifying specific filenames from the noise of the resources/network traffic will take some time, though there are a few points we can keep in mind:</p>
<ol>
<li><p>Firstly, if image/video/mp3 files are present, note their filenames.</p>
</li>
<li><p>Based on the behavior of the phishing site, sometimes JS files or CSS files can be taken as the unique filename.</p>
</li>
</ol>
<h4 id="heading-unique-files-from-the-phishing-site"><strong>Unique Files from the Phishing Site</strong></h4>
<p>In this case of the phishing site, we can identify a few image file names to be unique:</p>
<pre><code class="lang-plaintext">- boi_logo_grey.svg
- map-marker-white-icon.svg
- more-prelogin-icon.svg
- logo-blue-text.png
- powered_by_logo.svg
</code></pre>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/file_name1.png" alt class="image--center mx-auto" /></p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/file_name2.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-finding-similar-phishing-site-urls"><strong>Finding Similar Phishing Site URLs</strong></h3>
<p>After identifying the filename, we can start hunting similar phishing site URLs via <a target="_blank" href="https://urlscan.io/">URLScan.io</a> [Website scanner for suspicious and malicious URLs, but we can scan any URL]. We will be leveraging the <a target="_blank" href="https://urlscan.io/search/#*">search endpoint</a> to search the filenames we have. The query for searching any file is : <code>filename: "filename.ext"</code>.</p>
<p>After searching the image file: <code>boi_logo_grey.svg</code>, we have found more than 1000+ URLs, some of which are duplicates and old ones.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/02/image-3-1024x673.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-updated-removing-flase-positive-from-the-obtained-result"><strong>[Updated] Removing Flase Positive from the Obtained Result</strong></h3>
<p>Despite having websites with similar patterns URLs, we can still differentiate them by filtering out results based on other queries such as the filename and hash value. We can obtain the hash value of a scanned URL by clicking on the “+” button on the right side of the file we want to get the hash value from, located in the result section of the URL scan tab.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/03/image-1024x429.png" alt class="image--center mx-auto" /></p>
<p>Once we get the hash value for the file of our interest then we can create the final query: <code>filename:"boi_logo_grey.svg" AND hash:13300feda859b998be4625203d06747c5313e87c566dcee605a316c24a79bbe5</code> to get the filtered out results.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/03/image-2-1024x701.png" alt class="image--center mx-auto" /></p>
<p>Thanks to <a target="_blank" href="https://www.linkedin.com/in/robemtnez/">Roberto Martinez</a> for sharing this valuable feedback, to add the <code>hash value</code> of the file, after posting this blog on LinkedIn.</p>
<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>I shared my thoughts on <a target="_blank" href="https://huskyscripts.blog/how-to-hunt-similar-phishing-sites-without-analyzing-their-phishing-kit">how to hunt similar phishing sites without analyzing their phishing kit</a>. Through my experience, I have found that this method can help us locate phishing sites that may be using the same kit. Additionally, it is possible to uncover phishing sites that use assets from different kits using this approach.</p>
]]></content:encoded></item><item><title><![CDATA[Hunting Phishing URLs Made Easy: A Comprehensive Series [0x2]]]></title><description><![CDATA[Introduction
In the previous part of this blog series, we learned about the structure of phishing websites, which can aid us in identifying similar phishing websites. In this part, we will focus on identifying similar phishing websites from a single ...]]></description><link>https://huskyscripts.blog/hunting-phishing-urls-made-easy-a-comprehensive-series-0x2</link><guid isPermaLink="true">https://huskyscripts.blog/hunting-phishing-urls-made-easy-a-comprehensive-series-0x2</guid><category><![CDATA[phishing]]></category><category><![CDATA[threat intelligence]]></category><category><![CDATA[#cybersecurity]]></category><dc:creator><![CDATA[thebitdoodler]]></dc:creator><pubDate>Tue, 30 Jan 2024 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741365952917/eca50620-1b58-4568-a794-02c34d0b2bbb.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction"><strong>Introduction</strong></h2>
<p>In the <a target="_blank" href="https://huskyscripts.hashnode.dev/hunting-phishing-urls-made-easy-a-comprehensive-series-0x1">previous part</a> of this blog series, we learned about the structure of phishing websites, which can aid us in identifying similar phishing websites. In this part, we will focus on identifying similar phishing websites from a single phishing website. We will utilize a community-based platform, URLScan.io, to hunt down identical phishing URLs. </p>
<h2 id="heading-the-phishing-url"><strong>The Phishing URL</strong></h2>
<p>To begin the hunting game, we require an active phishing URL as our starting point. There are numerous ways to obtain a live phishing URL, but I usually search the latest Twitter feed using the #<a target="_blank" href="https://twitter.com/search?q=%23phishing&amp;src=typed_query">phishing</a> or #<a target="_blank" href="https://twitter.com/search?q=%23scam&amp;src=typed_query&amp;f=top">scam</a> hashtags. Victims or recipients of phishing/suspicious URLs share screenshots when they receive such links, and one of the benefits of this is that we get to see the distribution medium of the phishing link. While browsing through the Twitter feed, I promptly identified a URL via @<a target="_blank" href="https://twitter.com/CriminalIP_US">CriminalIP</a>’s Twitter account, and it turned out to be an Apple Phishing Page, as indicated in the <a target="_blank" href="https://twitter.com/CriminalIP_US/status/1749114640079155215">post</a>.</p>
<p><em>CriminalIP’s Twitter post</em></p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://twitter.com/CriminalIP_US/status/1749114640079155215">https://twitter.com/CriminalIP_US/status/1749114640079155215</a></div>
<p> </p>
<p>The suspicious link mentioned in the post is <a target="_blank" href="https://www.criminalip.io/domain/report?scan_id=10937976">http://apple-clone-by-rebie[.]netlify[.]app</a>, fortunately, it was active while writing this blog.</p>
<h2 id="heading-analysis-of-the-url"><strong>Analysis of the URL</strong></h2>
<p>Once we have the URL to analyze it and get the necessary information, we can scan it on URLscan.io or do it ourselves(manually with the browser). Here, we will do it in both ways.</p>
<h3 id="heading-scan-with-urlscanio"><strong>Scan with URLScan.io</strong></h3>
<p>URLScan.io is one of the best tools for scanning any URL. It helps us to extract all the associates and entities. Like from WHOIS records and screenshots of the webpage, including IP address and passive DNS data of the URL.</p>
<p><strong>Steps to Scan a URL in URLScan.io:</strong></p>
<ul>
<li><p>Go to the urlscan.io and paste the URL that needs to be scanned in the URL to scan box. Click on the <code>Public Scan</code> button to scan it.  </p>
<p>  <img src="https://lh7-us.googleusercontent.com/NZW7PRS5We_kR7TMP0sZSiCKdZgcXz1-eoOAs0zrQYK2J8AGwbwAEJa__M-brnmm3oReqw-gdt7A9bar8OaECcSycEMv8u3rPLcJh7_rsVprxQTKhpJDVxuzlX6QKTd6k3O__hYiGln0amzUGkyDnTbAIHHHgxh6SWxWeTn0l3n28ahcSsC8wSaqfSwE9w" alt class="image--center mx-auto" /></p>
</li>
<li><p>Once the scan is complete, a page displaying the summary of all HTTP requests, external links, redirect behaviors, and a screenshot of the webpage will load. The Phishing URL result can be shown here: <a target="_blank" href="https://urlscan.io/result/f0972c72-2948-4f08-9d1b-4f91bb1a6d1b"><code>https://urlscan.io/result/f0972c72-2948-4f08-9d1b-4f91bb1a6d1b</code></a>  </p>
<p>  <img src="https://lh7-us.googleusercontent.com/lh3POzo2yUZMAQ4YCFUcUsR0EZpM_uXvuHs0t8ie97QfhONiDPE35Nt1_v7FqwmcbHP0avJUYFEKMXJh7KW9LB-nqI0HVyjqpnI6RqR0BSD-3OxmWLbIzbJqQQ8mB8TfvlUblu5GF7IVo1tj_McgG-lhaphZ5tKbtRORq9EVqi6397RPA0hwyxwZhjz9BQ" alt class="image--center mx-auto" /></p>
</li>
</ul>
<p>Scanning URLs and checking results are hassle-free, so if you are starting with phishing URL hunting, this platform will greatly help you. Also, I am planning to write a dedicated blog on Hunting with URLScan.io.</p>
<h3 id="heading-analyzing-manually"><strong>Analyzing Manually</strong></h3>
<p>We can also find more information about the phishing website if we open the URL using a local browser.</p>
<blockquote>
<p><cite>PS: It is always advisable to open phishing sites in a temp browser or maintain proper OPSEC.</cite></p>
</blockquote>
<p>Most of the time, I always open the Network tab from the browser’s Developer Tools[<code>Ctrl+Shit+i</code>] before I open any phishing URL in the local browser to get network traffic visibility.</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/01/image-3.png" alt class="image--center mx-auto" /></p>
<p>Now we can have more information about the phishing URL, like what the files loaded and their names or if any particular files are getting loaded from the other external links.</p>
<h2 id="heading-hunting-similar-urls"><strong>Hunting Similar URLs</strong></h2>
<p>After getting more information about the websites and the assets, we can search for unique file names that are getting loaded. With the file, we can reverse-search other URLs in URLScan.io. The syntax for searching URLs is based on its file: <code>filename:”&lt;filename.extnsion&gt;”</code>.</p>
<p>On the website mentioned above, we have a few files that seem unique:</p>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/01/image-2.png" alt class="image--center mx-auto" /></p>
<p>Let’s try to find similar websites that were likely using the same files:</p>
<ul>
<li>With <code>filename:"apple-card-logo.png"</code>, we have found similar patterns in URLs that impersonate Apple </li>
</ul>
<p><img src="https://huskyscripts.blog/wp-content/uploads/2024/01/image-1.png" alt class="image--center mx-auto" /></p>
<ul>
<li><p>And with the other file name, <code>filename:"search-icon-sm.png"</code>We have found more similar URLs  </p>
<p>  <img src="https://lh7-us.googleusercontent.com/6h_Ku-F8NhvNllc0aFn3ybFUf6leSgt0rYmqtxmqd-zkwD2BLG7zZxM00GGqlyCfHMA4tYdQSe_A84JOaEBMHUFaEONvDATEDiaiMLM1n6axQmZtEyUiKt6rWpBn-2PJdScr63M7Sq7Wv4ywf80wz9mdjIAg7NXJLK1CI--0NJst6f-MNJsGndWROMiKSA" alt class="image--center mx-auto" /></p>
</li>
</ul>
<h3 id="heading-list-of-similar-phishing-urls"><strong>List of Similar Phishing URLs</strong></h3>
<table><tbody><tr><td><p>hxxp[://]sebene27[.]github[.]io/apple[.]com-clone-bootstrap/<br />hxxps[://]illustrious-peony-447413[.]netlify[.]app/<br />hxxp[://]apple-clone-by-rebie[.]netlify[.]app/<br />hxxps[://]apple-with-bootstrap[.]netlify[.]app/<br />hxxp[://]golos[.]com[.]ua/<br />hxxp[://]www[.]wise-cad[.]com/<br />hxxp[://]samigutema[.]com/<br />hxxps[://]www[.]samigutema[.]com/<br />hxxp[://]objective-blackwell-5e79b8[.]netlify[.]app/<br />hxxps[://]apple-bootstrap[.]pages[.]dev/<br />hxxp[://]apple-with-bootstrap[.]netlify[.]app/<br />hxxps[://]www[.]apple-replica-bootstrap[.]naty12[.]com/<br />hxxp[://]sebene27[.]github[.]io/apple[.]com-clone-bootstrap<br />hxxp[://]illustrious-peony-447413[.]netlify[.]app/<br />hxxp[://]kaufman-cad[.]org/<br />hxxp[://]www[.]apple[.]nikeb13[.]com/<br />hxxps[://]objective-blackwell-5e79b8[.]netlify[.]app/<br />hxxps[://]www[.]appleclone[.]eyosiyastibebu[.]com/<br />hxxp[://]apple-replica-bootstrap[.]naty12[.]com/<br />hxxps[://]fervent-borg-a88941[.]netlify[.]app/<br />hxxps[://]showmeexchange[.]com/<br />hxxp[://]apple-bootstrap[.]pages[.]dev/<br />hxxps[://]apple-replica-bootstrap[.]naty12[.]com/<br />hxxps[://]samigutema[.]com/<br />hxxp[://]fervent-borg-a88941[.]netlify[.]app/<br />hxxp[://]appleboot[.]netlify[.]app/<br />hxxp[://]apple[.]nikeb13[.]com/<br />hxxps[://]www[.]applebootstrap[.]naty12[.]com/<br />hxxp[://]apple-clone12[.]netlify[.]app/<br />hxxp[://]downunderleisure[.]co[.]uk/<br />hxxps[://]www[.]hctax[.]info/<br />hxxps[://]coverageappple[.]000webhostapp[.]com/<br />hxxp[://]justonweb[.]be/<br />hxxps[://]www[.]apple[.]moebios[.]com[.]br/<br />hxxp[://]hctax[.]info/<br />hxxps[://]sebene27[.]github[.]io/apple[.]com-clone-bootstrap<br />hxxps[://]gentle-churros-0eaa63[.]netlify[.]app/<br />hxxps[://]justonweb[.]be/</p></td></tr></tbody></table>

<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>In this blog, I have discussed one of the approaches to how we can hunt for similar phishing URLs based on filenames used by phishing sites. In the next blog, I will write about more approaches to hunting for phishing websites.</p>
]]></content:encoded></item><item><title><![CDATA[Hunting Phishing URLs Made Easy: A Comprehensive Series [0x1]]]></title><description><![CDATA[Introduction
In this blog series, I share various ways to hunt phishing URLs [which may sometimes be malicious URLs, too]. Before tracking such URLs, it is always better to understand how phishing works in the real world, which includes creating phis...]]></description><link>https://huskyscripts.blog/hunting-phishing-urls-made-easy-a-comprehensive-series-0x1</link><guid isPermaLink="true">https://huskyscripts.blog/hunting-phishing-urls-made-easy-a-comprehensive-series-0x1</guid><category><![CDATA[phishing]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[thebitdoodler]]></dc:creator><pubDate>Sat, 06 Jan 2024 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741365407259/25792e26-5f85-4370-8eb5-47d81bf6bc23.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction"><strong>Introduction</strong></h2>
<p>In this blog series, I share various ways to hunt phishing URLs [which may sometimes be malicious URLs, too]. Before tracking such URLs, it is always better to understand how phishing works in the real world, which includes creating phishing websites and deploying them in the wild using various ways.  </p>
<p>In the first blog post, we’ll understand the process of deploying a phishing website through the lens of an actor, gaining insights into the various components of phishing sites.</p>
<h2 id="heading-launch-of-a-phishing-campaign"><strong>Launch of A Phishing Campaign</strong></h2>
<p>Deploying a phishing website starts with choosing a target of interest. Sometimes, actors also select targets based on the current trends in the industry. For example, a famous company is launching a new product for free, or some brands are offering discounts during some festival season. Once finalized, the target actors started with the phishing site development, which looks relevant in the contexts above. </p>
<p>So let’s see the other most essential segments:</p>
<ul>
<li><p><strong>Website Assets</strong>: The website resources encompass elements such as the replicated login page of the target, comprising HTML, JS, CSS, PHP, image, GIF, and video files that contribute to mimicking the appearance of the cloned site. In most cases, actors download used assets from the legitimate page of the specified target and manually create clon pages.</p>
</li>
<li><p><strong>Domain Registration</strong>: Domain registration is another creative task for actors to decide which domain names suit based on the target, product, and trend. Most of the time, actors go with <a target="_blank" href="https://www.kaspersky.com/resource-center/definitions/what-is-typosquatting">typo-squatted domain</a> names. Often, they buy free, cheap TLDs to save some bucks.</p>
</li>
<li><p><strong>Picking a Hosting Provider</strong>: The most crucial part of the process is to choose the right hosting provider with fewer regulations and shady operations. Such a lack of ordinance will help the phishing sites longer than the regulated ones. In this case, they wisely choose freemium services to host the cloned page. Some famous freemium services are Cloudflare free hosting services(Pages), Firebase free hosting services including Webohsot, and many others. But it is hard to bet that actors are always looking for relatively new, free alternative services to stay out of the radar of detection engines.</p>
</li>
<li><p><strong>Distribution Mediums</strong>: The final stage involves creating a distribution plan, where the actors decide the distribution medium of the phishing URLs. The primary distribution methods are SMS and Email, but actors may also use SEO poisoning techniques to disseminate these URLs through various search engines. Recently, ads through social media platforms such as Facebook, Instagram, and Twitter have also become popular.</p>
</li>
</ul>
<h2 id="heading-entities-of-a-phishing-website"><strong>Entities of A Phishing Website</strong></h2>
<p>The following are some entities of a phishing website, which are extremely useful in hunting similar websites, which will be discussed later in this blog:</p>
<ul>
<li><p><strong>URL</strong>: This is one of the first indicators of any phishing website to notice. It helps us identify the pattern, which eventually aids us in finding other similar phishing sites.</p>
</li>
<li><p><strong>Site Title</strong>: The site title in phishing websites can be crucial if unique or peculiar because it helps us uncover similar phishing sites.</p>
</li>
<li><p><strong>DOM</strong>: Document Object Model cross-platform and language-independent interface that treats an HTML or XML document as a tree structure wherein each node is an object representing a part of the document. </p>
</li>
<li><p><strong>Assets</strong>: Assets have been used to design particular sites. They could be a single logo, favicon or background image video, GIFs, or other files. In this case, the unique file names are an essential indicator of finding similar phishing websites.</p>
</li>
</ul>
<h2 id="heading-phishing-kit"><strong>Phishing Kit</strong></h2>
<p>A Phishing Kit is a collection of tools, and resources used to create phishing websites or emails that impersonate legitimate ones. In a simple word, this is nothing but the file/assets required to create the phishing website. Phishing kits are the main weapon of any actor or group of actors to launch phishing campaigns fast and effectively.</p>
<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>This section is intended for beginners to understand the structure of a phishing website and why certain entities are used when hunting them. In the next part of the blog, we will write about “<a target="_blank" href="https://huskyscripts.blog/blog/hunting-similar-phishing-urls/">Hunting Similar Phishing URLs in the Wild</a>.”</p>
]]></content:encoded></item><item><title><![CDATA[Behind the Screens: Unmasking a New Phishing Scam in Indonesia]]></title><description><![CDATA[TL;DR
Over the weekend, while leisurely browsing the internet, I came across a unique and suspicious link designed specifically for an Indonesian audience. This scam had a fresh approach that piqued my curiosity, prompting me to investigate further. ...]]></description><link>https://huskyscripts.blog/behind-the-screens-unmasking-a-new-phishing-scam-in-indonesia</link><guid isPermaLink="true">https://huskyscripts.blog/behind-the-screens-unmasking-a-new-phishing-scam-in-indonesia</guid><category><![CDATA[#PhishingAttacks ]]></category><category><![CDATA[phishingkit]]></category><category><![CDATA[phishing]]></category><category><![CDATA[threat intelligence]]></category><dc:creator><![CDATA[thebitdoodler]]></dc:creator><pubDate>Sun, 01 Oct 2023 18:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741414942861/4c288791-1a81-405a-b0dd-6aeaa3adc9df.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-tldr"><strong>TL;DR</strong></h2>
<p>Over the weekend, while leisurely browsing the internet, I came across a unique and suspicious link designed specifically for an Indonesian audience. This scam had a fresh approach that piqued my curiosity, prompting me to investigate further.  </p>
<p>As I delved into the fraudulent website, I uncovered additional templates resembling WhatsApp Group Invitations, which ultimately served as a disguise for stealing people’s Facebook login credentials. What made this even more alarming was the content shared within these WhatsApp groups, as they were primarily centred around the distribution of viral and explicit adult videos.  </p>
<p>In this blog, I’ll discuss my methods for thoroughly investigating a scam campaign, starting from the very basics. Along the course of this campaign, I also came across the phishing kit that had been utilized.</p>
<h2 id="heading-the-phishing-page"><strong>The Phishing Page</strong></h2>
<p>I uncovere this phishing page while surfing through a Telegram Channel. It was impersonating the WhatsApp Group Invitation Page which was focused on sharing sharing viral and explicit adult content[Fig. 1].  </p>
<p><strong>Phishing URL</strong>: <code>hxxps://chatwpscpij.terbaru-2023[.]com/Faxt16jOoXfq6</code></p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-1.png?w=660" alt class="image--center mx-auto" /></p>
<p>Fig.1 impersonating whatsapp group invite focused on sharing viral and explicit adult content</p>
<p>Since all the content was written in the Indonesian language, it was clearly targeted towards the Indonesian people. Upon clicking the “Bergabung Ke Chat” or “Join the Chat” button, it redirected to a Facebook login page, prompting users to enter their login credentials and loaded <kbd>go.</kbd><code>&lt;kbd&gt;php&lt;/kbd&gt;</code> file.</p>
<p>Since all the content was written in the Indonesian language, it was clearly targeted towards the Indonesian people. Upon clicking the “Bergabung Ke Chat” or “Join the Chat” button, it redirected to a Facebook login page, prompting users to enter their login credentials and loaded <em>go.php</em> file.</p>
<p>Since all the content was written in the Indonesian language, it was clearly targeted towards the Indonesian people. Upon clicking the “Bergabung Ke Chat” or “Join the Chat” button, it redirected to a Facebook login page, prompting users to enter their login credentials and loaded <em>go.php</em> file.</p>
<p>Fig 2: Clonned Facebook Login Page: go.php</p>
<p>When attempting to enter random credentials and clicking the Login button, it triggered the execution of the <em>check.php</em> file on the backend, resulting in a blank page but internally taking the data and saving it to a data.json file[got the filename later when I discovered the phishing-kit for the same template].</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-3.png?w=750" alt class="image--center mx-auto" /></p>
<p>Fig 3: stealing credentials via check.php execution</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-4.png?w=750" alt class="image--center mx-auto" /></p>
<p>Fig 4: check.php file which steals credentials from the phishing-kit</p>
<h2 id="heading-discovering-the-phishing-kit"><strong>Discovering the Phishing Kit</strong></h2>
<p>After exhaustively exploring various methodologies and inspecting the endpoint that led to a blank page, it initially appeared to be a dead end. However, my determination led me to explore alternative methods to gather more information about the phishing domain. During one of these methods, where I attempted to gather information about the certificates associated with the phishing domain, I conducted a search on <a target="_blank" href="https://crt.sh/">crt.sh</a>. To my surprise, this search revealed the existence of additional subdomains linked to the phishing domain through their SSL certificates. One of the previously mentioned subdomains inadvertently exposed the phishing kit.</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-5.png?w=750" alt class="image--center mx-auto" /></p>
<p>Fig 5: Certificate Transparency log for the phishing domain</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-6.png?w=665" alt class="image--center mx-auto" /></p>
<p>Fig 5.1: Exposed phishing-kit from one of the subdomains</p>
<h2 id="heading-workflow-of-the-phishing-kit"><strong>Workflow of the Phishing Kit</strong></h2>
<p>Upon downloading and thoroughly analyzing this phishing kit, the entire workflow of the phishing template became clear and comprehensible.</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-7.png?w=750" alt class="image--center mx-auto" /></p>
<p>Fig 6: complete workflow of the phishing-kit</p>
<p>In the final stages of examining the entire workflow, I made a crucial discovery when inspecting the last executed file, wana.php. It became evident that all the collected credentials were sent to a different endpoint, as depicted in Figure 7. As I investigated the remote host server, I found a message in Indonesian that read: “Mau Nyolong? wkwkkwkw” (translated to English as “Want to Steal? hahahaha”), conveying a sense of trolling or mockery from the threat actor behind this campaign .See the Fig 8.</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-8.png?w=750" alt class="image--center mx-auto" /></p>
<p>Fig 7: Victim’s Credentials were exfiltrated to a different server</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-9.png?w=750" alt class="image--center mx-auto" /></p>
<p>Fig 8: The TA being a troll 😛</p>
<p>What makes this situation particularly intriguing is that, upon examining the source code, it becomes apparent that the scammer or group of scammers responsible for this campaign lacks technical sophistication. This is evidenced by the fact that they have hardcoded a few Gmail addresses and making it possible for anyone to access victim data simply by reviewing the source code[Fig 9]. Upon inspecting the active phishing sites, it appears that there hasn’t been a significant number of victims so far. This suggests that the campaign may have only recently begun, and its impact has been limited thus far[Fig 10]</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-10.png?w=723" alt class="image--center mx-auto" /></p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-11.png?w=750" alt class="image--center mx-auto" /></p>
<h2 id="heading-similar-phishing-site-hosted-on-the-same-domain"><strong>Similar Phishing Site Hosted on the Same Domain</strong></h2>
<p>During the writing of this blog, I came across several more phishing websites hosted on the same domain, all of which were actively engaged in similar phishing activities. These websites appeared to follow a similar workflow but utilized different phishing-kit templates, indicating a coordinated effort by the scammers to target victims using multiple variations of their scam.</p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-12.png?w=656" alt class="image--center mx-auto" /></p>
<h3 id="heading-phishing-domains"><strong>Phishing Domains</strong></h3>
<pre><code class="lang-plaintext">hxxps://grup-warxik.terbaru-2023[.]com/vhsfhqpdhdxih1
hxxps://grup-wakcor.terbaru-2023[.]com/vhsfhqpdhdxih1
</code></pre>
<p>Additionally, I encountered another type of phishing website that employs a different tactic to lure victims by impersonating <mark>Mediafire</mark> brand. This website tricks users into divulging their Facebook credentials under the false pretense of granting access to download viral adult content videos. It’s evident that these scammers are employing various deceptive strategies to steal sensitive information from unsuspecting individuals.</p>
<h3 id="heading-another-phishing-domain"><strong>Another Phishing Domain</strong></h3>
<pre><code class="lang-plaintext">hxxps://mediafirejeryghx.terbaru-2023[.]com/Faxt16jOoXfq6
</code></pre>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-13.png?w=656" alt class="image--center mx-auto" /></p>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-14.png?w=677" alt class="image--center mx-auto" /></p>
<h2 id="heading-additional-findings"><strong>Additional Findings</strong></h2>
<p>While having a conversation with the founder(<a target="_blank" href="https://www.linkedin.com/in/bradleyjkemp">Bradley Kemp</a>) of <a target="_blank" href="https://phish.report/">phish.report</a> about this canmpaign he shared me some insights on how we can track more similar website, using the tool <a target="_blank" href="https://phish.report/IOK">IOK</a>(which is based on <a target="_blank" href="https://urlscan.io/">URLScan.io</a> API query) by phish.report.  </p>
<p>By utilizing URLScan.io and inputting a filename from the phishing kit, we can hunt additional similar phishing URLs from the platform.</p>
<p>While having a conversation with the founder(<a target="_blank" href="https://www.linkedin.com/in/bradleyjkemp">Bradley Kemp</a>) of <a target="_blank" href="https://phish.report/">phish.report</a> about this canmpaign he shared me some insights on how we can track more similar website, using the tool <a target="_blank" href="https://phish.report/IOK">IOK</a>(which is based on <a target="_blank" href="https://urlscan.io/">URLScan.io</a> API query) by phish.report.  </p>
<p>By utilizing URLScan.io and inputting a filename from the phishing kit, we can hunt additional similar phishing URLs from the platform.  </p>
<p><strong>Query URL</strong>: <a target="_blank" href="https://urlscan.io/search/#filename:%2220230920-195253.png%2">https://urlscan.io/search/#filename:%2220230920-195253.png%2</a></p>
<pre><code class="lang-plaintext">filename:"20230920-195253.png"
</code></pre>
<p><img src="https://huskyscripts.files.wordpress.com/2024/01/image-15.png?w=750" alt class="image--center mx-auto" /></p>
<p>Screenshot from URLScan.io of similar phishing sites using the same image file from a phishing-kit</p>
<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>Indeed, it is observed that scammers are employing various techniques to lure victims, but their ultimate goal remains straightforward: stealing social media credentials. This campaign has illustrated that scammers can impersonate not just Facebook but potentially any other social media platform, using different templates. It emphasizes the need for heightened vigilance when clicking on shared links in WhatsApp groups or Telegram channels. Furthermore, we must be conscious of when and where we provide our login credentials to protect ourselves from falling victim to these scams.  </p>
<p>In closing, I encourage you to share this blog with others to spread awareness about these phishing campaigns and the importance of online security. For threat hunters and cyber threat researchers, this might serve as a valuable starting point in uncovering and addressing other phishing campaigns lurking in the digital landscape. Your contributions to our collective online safety are greatly appreciated.</p>
<blockquote>
<p><em>FeedbackYour feedback is invaluable, so please connect with me on</em> <a target="_blank" href="https://x.com/huskyscripts"><em>Twitter</em></a> <em>to share your thoughts and insights. Together, we can help protect ourselves and our online communities from cyber threats.</em></p>
</blockquote>
]]></content:encoded></item></channel></rss>