Skip to content
Figure
6 – Phishing Website Code

Figure
7 – Legitimate Booking Website Phone Section Code
Figure
8 – Phishing Page Phone Section Code
More to that, on the “Your Details” page
where the victims are asked to provide credit card information, there are
script snippets added to the end of the HTML Code that function as credit card
information submission function. It can be observed that the Threat Actor
cannot keep certain comment to themselves.
Figure
9 – Credit Card Submission Function
Even more interesting, the Threat Actor are
considering numerous scenarios that could happen with the Credit Card
transaction and have created multiple functions to catch these scenarios, here
are some of the scenarios they have planned:
- The user is utilizing multi
factor authentication (SMS Code, Application Code, etc.). - The user is hitting transaction
limit. - The user is not having the
minimum amount of money on their account. - The user is not using 3D-Secure
authentication. - The user online payment is
disabled. - The user transaction is blocked
by Geolocation blocking. - The user is using other banks
that the Threat Actor is not aware of.
Figure
10 – User Scenarios Function
The Threat Actor then will display
different messages for each scenario, instructing the victims on how to make
sure the transaction will go through successfully.
Figure
11 – User Scenarios Response
One function is also able to request SMS
code from the victim and submit the code automatically to the Threat Actor
server where it will perform the MFA bypass. Note that there is a comment
containing “pluxurydarklord”, likely the alias of the creator of the
function or the script. The SMS code is passed utilizing the Axios post
request.
Figure
12 – SMS Code Handling Function

Figure
13 – HTTP transactions information from urlscan.io
Digging
deeper into the submit.js code, we are seeing lot of capture and verification
functions to support data collection of the victim. Below are the functions to verify email
address and phone number.
Figure
14 – Email Address and Phone Verification Function
The threat actor took precautions to ensure
that the victim entered valid credit card details, including the credit card
number, expiration date, and CVV number. Below is the function that employs
custom regex patterns to validate various recognized credit card formats.
Figure
15 – Credit Card Verification Function
Finally,
within the submit.js code, there are intriguing comment lines at the beginning
of the code within the phone-inputs-wrapper. Upon closer examination, it was
revealed that these comments appeared unusual due to encoding issues when
transitioning between the Russian Cyrillic and English language systems.
Figure
16 – Interesting Comment Lines
After fixing the encoding, the comments are
indeed written in Cyrillic:
// Получаем текущее значение в поле ввода
var inputValue = input.value;
// Используем регулярное выражение для удаления всех символов, кроме
цифр
var numericValue = inputValue.replace(/[^0-9]/g, “”);
// Обновляем значение в поле ввода только цифрами
input.value = numericValue;
The comments are translated to:
// Get the current value in the input field
var inputValue = input.value;
// Use a regular expression to remove all characters except for
digits
var numericValue = inputValue.replace(/[^0-9]/g, “”);
// Update the value in the input field with digits only
input.value = numericValue;
The code is
likely written in the systems with Cyrillic encoding system.
Perception
Point researchers already did the investigation to answer the question.
What’s absent from this campaign’s
narrative is that hotels became targets of InfoStealer malware, delivered
through phishing URLs in emails disguised as messages from hotel customers. As
a result of successfully harvesting official Booking account credentials, the
threat actor gains the capability to access valuable customer information. This
includes full names, booking dates, specific hotel information, and partial
payment details that were employed to secure reservations on the platform.
Perception Point’s assessment indicates
that numerous hotels and resorts have become victims of InfoStealer attacks,
resulting in thousands of individuals having their credit card information
compromised on a global scale.

Figure
17 – OLX Phishing Page
We also
observed that the threat actor is utilizing Domain Fronting to prevent
detection based on IP addresses, but this time they are using different service
providers, DDOS-Guard based in Russia.
Figure
18 – Domain Fronting Technique using DDOS-Guard
Another instance occurred in November 2021,
where the threat actor replicated the website of the Polish InPost package
delivery service, with their focus on the product seller.
Figure
19 – InPost Phishing Page
The threat actor employs identical information to persuade
both the victim, while continuing to employ domain fronting techniques,
specifically utilizing the Cloudflare service. Furthermore, we note the
existence of chat functionality on both pages. Notably, in this instance, there
is an evident use of URL shortening to circumvent potential detection related
to the URL, likely aimed at evading email spam/phishing filters.
Figure
20 – URL Shortener as Evasion Method
In summary, approximately 1,300 URLs
exhibiting campaign-related characteristics have been submitted to urlscan.io
since the initial entry in October 2021. When randomly sampling data from
various time intervals (today, 3 months ago, 6 months ago, 1 year ago, and 2
years ago), the following features are observed.
Time | Domain | Company Impersonated | TLS Certificate Issuer | Domain Fronting | Target |
Today | confirmation-booking[.]id59212[.]top | Booking | R3 | Cloudflare | Buyer |
3 Months Ago | Blablacar[.]pay-id332[.]ru | BlaBlaCar | GTS CA 1P5 | Cloudflare | Buyer |
6 Months
Ago | Foxpost[.]reservation08009[.]cloud | FoxPost
Hungary | GTS CA 1P5 | Cloudflare | Seller |
1 Year Ago | posta-ch[.]order-id87397[.]cloud | SwissPost | GTS CA 1P5 | Cloudflare | Seller |
2 Years
Ago | allegro-fxyd[.]secur-umowa[.]space | Allegro Polish | Cloudflare
Inc ECC CA-3 | Cloudflare | Seller |
Over the last two years, the threat actor
has frequently impersonated e-commerce and parcel delivery platforms listed in
the urlscan.io database. See below table for the commonly impersonated
platforms.
Organization | Domain Count (urlscan.io) |
SwissPost | 105 |
Carousell | 100 |
Privat24 | 25 |
OLX | 68 |
InPost | 22 |
FoxPost | 29 |
SberBank | 14 |
DHL | 28 |
Vinted | 41 |
Booking | 26 |
NZPost | 21 |
Wallapop | 20 |
- With high confidence, the two credit card
harvesting campaigns observed can be linked in to one campaign, with these
shared TTPs and IoCs. - Phishing delivery methods,
including chat functionality and email with shortened URLs. - Implementation of Domain
Fronting, such as through Cloudflare and DDOS-Guard services. - The attacker gained control
over seller or buyer accounts (likely through InfoStealer) and provided all
purchase-related information to enhance the phishing’s authenticity. - Crafting a convincing phishing
page that replicates the legitimate site using its underlying code. - Developing custom functions to
address issues related to failed credit card transactions and input submission
and verification. - Incorporating a Chat Support
feature to bolster the phishing page’s authenticity. - Common TLS certificate issuers
are typically R3 and GTS CA 1P5.
For user, both as sender and seller, make
sure to follow these recommendations to ensure the safety of your account.
·
Beware of Phishing Attempts: Be
cautious of emails, chat messages, text, or pop-up ads that request personal or
financial information. Legitimate companies will never ask for sensitive
information via email or messages. If in doubt, contact the company directly
using their official contact information.
·
Use Online Tools for
Verification: consider using online tools like urlscan.io or VirusTotal to scan
suspicious URLs or files. These tools can help you identify potentially harmful
websites or downloads.
·
Report Suspicious Activity: If
you suspect that a seller or a buyer is engaging in fraudulent behavior, report
it to the platform’s support center. They can investigate and take appropriate
action.
·
Use Strong Passwords: Create
strong, unique passwords for your online shopping accounts. Avoid using easily
guessable information, like your name or birthdate. Consider using a password
manager to generate and store complex passwords securely. Never reuse the same
password.
·
Implement Multi-Factor
Authentication (MFA): Enable MFA on your accounts whenever it’s an option. MFA
adds an extra layer of security by requiring you to provide a second piece of
information (e.g., a one-time code sent to your phone) in addition to your
password.
Source: https://www.curatedintel.org/2023/12/curated-intel-threat-report-multi.html
Views: 0