Silent Push Monitors Russia-Linked Cryptocurrency Threat Actor Engaged in Political Deception

Short Summary

Threat analysts are monitoring a Russian-linked threat actor deploying domains for crypto scams targeting the US Presidential Election and major US tech brands. The scams promise fake cryptocurrency giveaways, urging users to send coins to attacker-controlled wallets. Numerous websites impersonate prominent figures and organizations, using counterfeit legal documents to lend credibility to the scams.

Key Points

  • Threat actor linked to Russia deploying crypto scam domains.
  • Scams involve fake Bitcoin and Ethereum giveaways.
  • Targeted individuals include high-profile figures like Donald Trump and Elon Musk.
  • Fake giveaways are promoted through spoofed websites and videos.
  • Domains are registered to a Russian email address and hosted behind Cloudflare.
  • Some domains feature chat functions instructing users on how to send cryptocurrency.
  • Fake legal letters from US regulatory bodies are used to legitimize scams.
  • Analysts are creating an IOFA Feed to track and mitigate these scams.

MITRE ATT&CK TTPs – created by AI

  • Phishing (T1566)
    • Threat actors use fake websites and emails to trick users into sending cryptocurrency.
  • Credential Dumping (T1003)
    • Potentially collecting user credentials through fake login prompts on spoofed sites.
  • Domain Spoofing (TLD-0001)
    • Creating domains that mimic legitimate organizations to deceive users.

Executive Summary

Silent Push Threat Analysts are tracking a threat actor, with links to Russia, who is actively deploying domains involved in crypto scams targeting the US Presidential Election, and prominent US tech brands.

The scams involve fake giveaways of Bitcoin and Ethereum cryptocurrency. Users are being asked to send coins to an attacker-controlled wallet, with the promise of double the amount of coins being returned to them.

Our research has unearthed a large number of websites featuring prominent US political figures, business leaders and global brand names advertising the fake giveaways, with counterfeit legal letters from US Government agencies attached to the domains to add legitimacy to the scam.

Individuals targeted include Former President Donald Trump, Vice President Kamala Harris, Apple CEO Tim Cook, Elon Musk, MicroStrategy co-founder Michael Saylor, Former Congressman Gene Green, Former Congressman Pete Olson, Peggy Kim (SEC), and Kerry O’Brien (FTC).

Brands and political institutions targeted include Apple, SpaceX, Donald Trump for President 2024 Campaign, MicroStrategy, Cardona Foundation, U.S. House of Representatives, U.S. Securities and Exchange Commission, and the U.S. Federal Trade Commission.

Background

Over the last 6 months, numerous reports have been published of websites using the image and likeness of Elon Musk and Donald Trump to propagate crypto scams, including AI deepfake videos.

Threat actors have hacked the YouTube channels of prominent social media personalities, and international sporting events, before posting videos promoting the scam to millions of subscribers.

Tracking the campaign

While investigating an unrelated campaign, our Threat Analysts discovered Indicator of Future Attack (IOFA) domains registered to the Russian email address [email protected], that suggested involvement in the aforementioned scams.

We executed an advanced content lookup using Silent Push Web Scanner, and what we knew about the deployment, management and on-page content of the aforementioned infrastructure, that revealed a cluster of live scam domains with the following shared characteristics:

  • Registered to [email protected]
  • Hosted behind Cloudflare
  • Similar themes, revolving around cryptocurrency, US financial/tech organizations, and the upcoming US Presidential Election (e.g. trumpdebate24[.]com), with matching body content
  • Pages hidden behind a CAPTCHA
  • Some pages featuring a chat function

One of the sites in the cluster features Russian language content – cryptologic[.]online – but seemingly isn’t involved in directly spoofing any organizations or individuals.

Analyzing domain content

Although some domains in the cluster have been identified as malicious and taken down by Cloudflare, there are still a number of domains live as of writing.

Here’s a sample of domains from the cluster, spoofing well-known US politicians, and business leaders:

Donald Trump spoofing page
Donald Trump spoofing page @ https://musk.trump[.]io
Presidential debate/Tesla spoofing page
Presidential debate/Tesla spoofing page
Apple spoofing page
Apple spoofing page @ https://apple-event2024[.]com
SpaceX spoofing page
SpaceX spoofing page @ https://btcstarship[.]com

Following the link on trump-debate[.]com, users are asked to participate in a “giveaway” by sending Ethereum coins to the wallet address 0x207Fe723F8B0d864A4Ae4e3B5F064883F207c642.

Chat scam operation

Initiating the transfer via chat functionality

Some domains also feature a chat function, that gives specific instructions on how to send transfer coins, prior to receiving “payment” from the scammers.

Chat scam operation response
Chat scam operation instructions

Several domains we encountered featured footer content that included fake legal letters from US regulatory bodies, legitimizing the proposed “giveaways” as sanctioned by the SEC, FTC and DOJ.

Here’s an example letter from debate[.]gives, involved in Tesla and US political debate spoofing:

Legal “disclaimer” on debate[.]gives
Legal “disclaimer” on debate[.]gives
Fake FTC letter @ debate[.]gives
Fake FTC letter @ debate[.]gives
Fake DOJ letter @ debate[.]gives
Fake DOJ letter @ debate[.]gives

Mitigation

Our Analysts are constructing a Silent Push IOFA Feed containing all the scam domains gathered during our investigation.

Enterprise users can ingest this data into their security stack to inform their detection protocols, or use it to pivot across attacker infrastructure using the Silent Push Console and Feed Analytics screen.

Throughout our investigation, we used the Silent Push Web Scanner to search for matching content elements and linked DNS infrastructure.

Web Scanner is available free as part of a Silent Push Community Edition subscription. Sign-up here.

IOFAs

  • trumpdebate24[.]com
  • cryptologic[.]online
  • musk.trump[.]io
  • apple-event2024[.]com
  • btcstarship[.]com
  • debate[.]gives
  • 0x207Fe723F8B0d864A4Ae4e3B5F064883F207c642

Source: https://www.silentpush.com/blog/us-political-crypto-scams/