Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add safecartusa[.]com to add-wildcard-domain #391

Conversation

g0d33p3rsec
Copy link
Contributor

@g0d33p3rsec g0d33p3rsec commented Apr 27, 2024

Phishing Domain/URL/IP(s):

https://safecartusa.com/MzEzVjFINGE4eDFTM3c=
https://safecartusa.com/M1oyajZEMHEycTFDOW4=
https://safecartusa.com/M3cyUTVWOGU5VDVtM3Y=
https://safecartusa.com/M04zMjFZNFM4NjJ5MXQ=
https://safecartusa.com/M0MzeTFTNFo4ZDFVN0I=
https://safecartusa.com/MzIxVTJ1NjI3cTU0OTg=
https://safecartusa.com/310335047127.htm
https://safecartusa.com/310335024831.htm
https://safecartusa.com/310335010285.htm
https://safecartusa.com/3103350859508.htm
https://safecartusa.com/310335031336.htm
https://safecartusa.com/310335014615.htm
https://safecartusa.com/3103350025351.htm
https://safecartusa.com/310335000325.htm
https://safecartusa.com/3103350864188.htm
https://safecartusa.com/3103350408202.htm
https://safecartusa.com/module/31033508944.htm
https://safecartusa.com/module/3103350067287.htm
https://safecartusa.com/M04zVDFBM1Y5NjZCMk4=
https://safecartusa.com/M3UxdzMwMk8wWjJGMUw=
https://safecartusa.com/M3AyQjRSMnEwOTdzNm4= 
https://safecartusa.com/M2czTDExNFE2VTM1Nlg=
https://safecartusa.com/MnAzcDg1M3IyTjJGOEQ=
https://safecartusa.com/310335087960.htm
https://safecartusa.com/310335034417.htm
https://safecartusa.com/module/3103350898351.htm
https://safecartusa.com/module/3103350900103.htm
https://safecartusa.com/310335093442.htm
https://safecartusa.com/module/3103350408202.htm
https://safecartusa.com/3103350002303.htm
https://safecartusa.com/310335003687.htm 
https://safecartusa.com/3103350180117.htm
https://safecartusa.com/310335091777.htm
https://safecartusa.com/310335027812.htm
https://safecartusa.com/3103350103188.htm 
https://safecartusa.com/310335044828.htm
https://safecartusa.com/31033505011.htm
https://safecartusa.com/310335012540.htm
https://safecartusa.com/310335037019.htm
https://safecartusa.com/M0IyQjZNMm04aDU5Nzc=
https://safecartusa.com/M2kzQzBzNWkyRzBpMXQ=
https://safecartusa.com/MzMxQTNoMlcwZTJsMU8=
https://safecartusa.com/M0kzOTFOMkE2MTlMMWw=
https://safecartusa.com/M3QzWDFMNFEwbDZCNVk=
https://safecartusa.com/M24xRTdENkM2cjBlNDg=
https://safecartusa.com/M3EzRjFiMGEyQzRSNm8=
https://safecartusa.com/MzkyWTF4NzcySDVaODc=
https://safecartusa.com/M2kyNzhPMkU3SDhBOG4=
https://safecartusa.com/M3IzTDFKNkQ0VTB3NUE=
https://safecartusa.com/M0IyZzRVOWU2SjFKMWU=
https://safecartusa.com/Mm84VzdsMVcwQzVlMVQ= 

Impersonated domain

https://www.ufs.ac.za/
https://ww1.ukzn.ac.za/
https://www.uwc.ac.za/
https://www.wits.ac.za/
https://www.wsu.ac.za/
https://facebook.com/
https://www.instagram.com/
https://www.snapchat.com/
https://twitter.com
https://ff.garena.com
https://www.betway.co.za

Describe the issue

This domain is now hosting the phishing kit that was previously at foreverfarley[.]com (#387), azezieldraconous[.]com (#381), westernautomobileassembly[.]com (#376) , littleswanaircon[.]com[.]sg (#372), iwan2travel[.]com(#370 ), applesforfred[.]com (#369), theaerie[.]ca (#367), nico[.]sa (#366), and ajstelecom[.]com[.]mx (#362)

Related external source

Screenshot

Click to expand

image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image
image

@g0d33p3rsec
Copy link
Contributor Author

g0d33p3rsec commented May 1, 2024

URIs on this domain have been returning 404s for a couple of days now. I'll leave the PR open for the maintainers to do with as they please. The activity group has moved to another host and can now be found at jestertunes[.]com (#393).

image

spirillen added a commit to mypdns/matrix that referenced this pull request May 1, 2024
@spirillen
Copy link
Collaborator

I'll merge them, then pyfunceble will remove the dead once

@spirillen spirillen merged commit 495c520 into mitchellkrogza:main May 1, 2024
@g0d33p3rsec
Copy link
Contributor Author

I'll merge them, then pyfunceble will remove the dead once

Thanks! I wonder if pyfunceble may be causing the false negatives when I add as domain or wildcard. When I first added by individual URI, Virus Total would return a positive once the commit was merged upstream. Since, as I've been adding as domain or wildcard, the sites seem to be dropped by the time this repo is merged upstream resulting in subsequent false negatives on VT from the Phishing Database even though the upstream repo showed recent merges. That's why I tried testing both a few commits ago but the results were inconclusive. I should have more time to dig into it after the semester ends next week. If you want to compare output, I've been trying to track the group using a VT collection which can be found at https://www.virustotal.com/gui/collection/5b7e996c553034dddc8c690ea6be0adb3182b0fa96ce6a8b29627e165fb47f38/iocs

Here's an example from a recent add https://www.virustotal.com/gui/url/0503dbd260648c364c10793657cdebe883da30554b3c9cbed639025ea45e58e7 Most of the detections shown are from hand feeding the domain to the individual EDR vendors, which can be a bit laborious.
image
image

@spirillen
Copy link
Collaborator

That is an interesting observation, and for sure something this project should be following up on. But where to run the thread?... Allow me to think about this one for a while and I'll try to find the right locate for this question, but for you observation about @PyFunceble it should not be the issue when we are in the case of adding records, that could be a case while testing for removal of outdated records

@g0d33p3rsec
Copy link
Contributor Author

That is an interesting observation, and for sure something this project should be following up on. But where to run the thread?... Allow me to think about this one for a while and I'll try to find the right locate for this question, but for you observation about @PyFunceble it should not be the issue when we are in the case of adding records, that could be a case while testing for removal of outdated records

Awesome, thanks for following up. I'll try to look into the upstream workflow and automation more once my schedule lightens up next week. I think the conversation would probably belong as an issue if the discussion needs to be in the open. On the other hand, I could also see a reason for treating it as a vulnerability since there's something preventing tactical intelligence from making it's way upstream.

@funilrys
Copy link
Collaborator

funilrys commented May 1, 2024

Interesting ... I'll have to investigate this too ...


@/githubbot remind me.

@g0d33p3rsec
Copy link
Contributor Author

I'll have to investigate this too

Thanks! I wasn't sure what to make of it when I first noticed as I was also observing some challenges with scanning the sites which I interpreted at the time as anti-forensic attempts. There were a couple of domains where I had to get a particular user-agent and referrer and others where I seemed to encounter geofencing. Now I'm leaning more towards a bug somewhere between the domain addition and automatic validation on our end. If there's anything I can help with, feel free to reach out.

@g0d33p3rsec
Copy link
Contributor Author

that could be a case while testing for removal of outdated records

I'm wondering what endpoints it tries to test if it only has the domain to work with and no specific URIs. For most hosts, the root domain has been returning a default Apache/ Nginx page of the sort that comes with a fresh install. The only exception that I can think of offhand is the deface that was done to westernautomobileassembly[.]com

@spirillen
Copy link
Collaborator

that could be a case while testing for removal of outdated records

I'm wondering what endpoints it tries to test if it only has the domain to work with and no specific URIs. For most hosts, the root domain has been returning a default Apache/ Nginx page of the sort that comes with a fresh install.

This is one of many reasons that PyFunceble by default leaves a record as ACTIVE if any test are positive and then disregards any other test results.

This is of course not the Holy Grail for how this should be handled, but as there isn't enough human resources to maintain and cats any scumbag URI out there, we have to cut some corners, also the fact of RFC:954 is limited to FQDN, it don't make a hole lot of seance to keep a URI list for all those running on the ~60 years old hosts file system or even the never RPZ. The only places you really can use URI systems are in browse addons like Ublock Origin and proxy servers like Squid

@/githubbot remind me

@g0d33p3rsec
Copy link
Contributor Author

This is one of many reasons that PyFunceble by default leaves a record as ACTIVE if any test are positive and then disregards any other test results.

Oh, that makes total sense and for an interesting problem. I should only have a few more days of having to think in C++ before I can get back to thinking in Python and take a closer look at both projects.

@spirillen
Copy link
Collaborator

URIs on this domain have been returning 404s for a couple of days now. I'll leave the PR open for the maintainers to do with as they please. The activity group has moved to another host and can now be found at jestertunes.com (#393).

@g0d33p3rsec As I do think about the 404 uri's from your list above, I can't think of any current process that actually would remove them from the project. Reason: we treats a 404 as a temporary brake in something bad, as you can see here:

So is there by any change that your code could run a automated test for this, or do I have to write up something (which I sucks at)

@g0d33p3rsec
Copy link
Contributor Author

g0d33p3rsec commented May 2, 2024

that could be a case while testing for removal of outdated records

So is there by any change that your code could run a automated test for this, or do I have to write up something (which I sucks at)

I'll have to study the issue more in depth. I just did a public scan of the page with the mentioned 404, for reference and while the initial request returned a 404 response, there were also a stack of 200's from the site's host which would make it even more challenging to automate the removal of this sort of false positive. The mentioned requests/ responses can be seen at https://urlscan.io/result/d161ba51-3f51-4613-b539-b6555819dc9c/#transactions. I'll try to revisit some of the other previous hosts next week to see what the responses were like from their servers after the actor had moved on to the next host. At least as far as this group is concerned, most of the hosts that I've observed are in a shared hosting environment and when I've gotten a response from the hosting companies, they tend to indicate that it was their responders who handled the remediation and not the victim responsible for the website. I may also be in a bit of an edge case as I'm tracking a single activity group in my reports which is allowing me to build some familiarity with their tactics as they move from host to host in a very linear fashion.

The false negatives are more of a concern as I'm still not seeing any of the domains from the merged commits make their way upstream. When the new records are being merged from this repo upstream, what checks are done to validate the current status? Does it just convert the domain to an http or https request and evaluate the response looking for any non 500 code? https://urlscan.io/result/9f8ec4ee-e738-4cac-979f-a78dfdb78550/ is an example from the domain that is currently hosting the kit. The only other thing that I can think of offhand is that the commits seemed to stop making their way upstream after the merge conflict (can't find which one offhand) removed an entry from the list.

@spirillen
Copy link
Collaborator

Moved the workflow question to #395

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants