Crypto Deceit: Fending Off The Phishing Nets Targeting Digital Assets

bs-single-container

The growing allure of cryptocurrencies draws both investors and cybercriminals to the digital finance sphere, with phishing nets targeting crypto wallets and businesses emerging as a key threat. These complex schemes take advantage of the trust placed in trustworthy bitcoin services, using deceptive strategies to steal digital assets from unsuspecting consumers.

This blog digs into the internal workings of a recently discovered phishing kit, which was painstakingly crafted to spoof the OpenSea platform—a leading marketplace for NFTs and digital collectables. Through an in-depth analysis,
we identify fraudsters’ tactics for collecting sensitive user information.

Anatomy of Crypto Phishing Kit

Findings

The Bolster researchers discovered a phishing kit on the CheckPhish platform that impersonated OpeaSea. This phishing kit is designed to collect IP addresses, operating systems, and passwords from crypto wallet users and then exfiltrate them using the Telegram bot, a popular strategy used in most phishing efforts. The wallets being targeted are Opensea, MetaMask, Trust Wallet, WalletConnect, Coinbase, Crypto, and Ledger.

Learn more about Telegram scams

Analysis

CrawlerDetect is a PHP class that detects bots, crawlers, and spiders using the user agent and http_ from headers. Currently capable of detecting thousands of bots, spiders, and crawlers.

Crawler Detect on phishing nets blog
Crawler Detect
PHP Script
PHP Script

The PHP script is part of the phishing campaign targeting OpenSea users, gathering their personal information such as IP address, operating system, and passwords, then passing this data to attackers via Telegram for unauthorized access or exploitation.

Telegram chat ID of the attacker and bot ID
Telegram chat ID of the attacker and bot ID
crypto wallets
Various crypto wallets targeted

This JavaScript code defines functions that open new browser windows with specific dimensions for various cryptocurrency wallets (e.g., MetaMask, Trust Wallet, WalletConnect, Coinbase, Crypto.com, and Ledger) and disable certain browser features, most likely to mimic legitimate wallet login pages as part of the phishing scheme.

MITRE ATT&CK

Understanding the tactics and techniques is critical for creating strong security measures and preventing potential threats. The Mitre TTP, after analysis of the webpage and phishing kit, is given below:

ID Tactic Technique Procedure

T1589

Reconnaissance

Gather Victim
Identity Information

Using CrawlerDetect, adversary may be able to deduce whether the visitor is a real potential victim or an automated system, focusing their efforts on real users, and using the CrawlerDetect feature to boost the kit’s stealth and efficacy by evading automated detection measures.

T1591

Reconnaissance

Gather Victim
Org Information

Adversary gathered the information on Opensea, MetaMask, Trust Wallet, WalletConnect, Coinbase, Crypto, and Ledger like social media pages, logos, and website details to create the scampage and phishing kit.

T1583

Resource
Development

Acquire
Infrastructure

Adversary using domains, C2 servers and telegram.

T1566

Initial Access

Phishing

The phishing kit symbolizes the phishing strategy of fooling people into believing they are interacting with authorized OpenSea pages, allowing first access to their information.

T1204

Execution

User Execution

Victims carry out the phishing technique by engaging with the false OpenSea page, specifically by attempting to log in using the fake cryptocurrency wallet windows generated by the JavaScript code.

T1027

Defense Evasion

Obfuscated Files
or Information

Adversary attempted to encrypt and obfuscate major portion of the phishing kit to hide the motive and functions of the scripts.

T1562

 Defense Evasion

Impair Defenses

The JavaScript routines that disable browser functionality is also intended to weaken security safeguards that would otherwise warn users to the phishing effort.

T1056

Credential
Access

Input Capture

The PHP script gathers personal information such IP addresses, operating systems, and passwords.

T1056

Collection

Input Capture

The PHP script gathers personal information such IP addresses, operating systems, and passwords.

T1113

Collection

Screen Capture

Phishing kits that mimic wallet login screens collect user inputs (passwords, PINs, etc.) as part of their collection phase.

T1071

Command and Control

Application Layer
Protocol

Data exfiltration to attackers using Telegram demonstrates the usage of application layer protocols for command and control communication.

T1041

Exfiltration

Exfiltration over C2 Channel

The acquired data, including personal and authentication information, is sent to the attackers via the Telegram bot, which serves as a C2 (Command and Control) channel.

T1565

Impact

Data
Manipulation

Obtaining login passwords and other sensitive information is used to conduct illicit transactions, drain wallets, or corrupt more accounts, thereby directly affecting the victim’s digital assets.

MITRE ATT&CK Navigator
MITRE ATT&CK Navigator

Impact & Mitigation

IMPACT MITIGATION

Breach and loss of personal identifiable information such as IP address, operating system, and passwords.

Implementing advanced security solutions, such as two-factor authentication (2FA) for wallet access and transactions can provide additional protection against illegal access.

Loss of wallet funds and assets leading to financial loss.

Use legitimate websites and social medias for the transactions.

Damage to Brand Reputation.

Immediately report any fraudulent transaction witnessed in the account and wallet.

Phishing Nets are Evolving

The inventiveness of phishing attacks directed towards cryptocurrency wallets and companies is a stark reminder of the constant care that must be taken to safeguard digital assets in the ever-changing realm of digital finance.

These cunning scams use the names of trustworthy cryptocurrency wallets and companies to deceive unsuspecting individuals, preying on their confidence and human mistakes.

An increasing number of proficient attackers are drawn to cryptocurrencies due to their growing popularity, as they want to profit from the ever-increasing market. People and corporations must stay current on the latest phishing strategies and establish comprehensive security processes.

Proactive investigation and vigilant monitoring are critical for detecting and limiting the efforts of individuals behind sophisticated phishing campaigns, especially when new methods of attack arise.

Our analysis emphasizes the significance of maintaining ongoing monitoring and developing forward-thinking measures to combat these dangers.

Appendix

IOC’s

Website

opensea-claim[-]item[.]lanzavac[.]com
opensea-claim[-]item[.]lanzavak[.]com

IP

185.94[.]230.197

file_hash opensea.zip

82bfa1ce7ee626671a238b1d3a7f9b4b47c342a9492315fd48abd2691a6937bf

file_hash openseaupdated.zip

42f8959cc65ea9e5508d2d0172c83ce5b9b658d7655d8e2a8e09dc58de33ce97

Telegram Bot API

7128876958:AAECW33NKPph97ripVVGiAW4PALxM3-Pi4Q

Telegram Chat ID

6530923855

 

Opensea website with the phishing kit
Opensea website with the phishing kit
Index of
Index of