The ASEC analysis team has been continuously updating the blog with information about phishing mails and urging users to take caution. Recently, the team confirmed a massive distribution of phishing mails with attachments that are assumed to be of the same type.
While the structures of the HTML files for the finally connected phishing sites are different for each phishing mail of this type, the structures of HTML attachments that redirect users are the same, and the URLs of the phishing pages are concealed using a certain URL shortener (chilp.it). The team will examine the two different phishing mails and explain the structural characteristics of the mails to answer why we think that the two mails are of the same type.
Figure 3 and Figure 4 below are the HTML attachments of the phishing mails shown in Figure 1 and Figure 2, respectively. Both files redirect users to phishing pages three seconds after being run and have the same grammar. Both hide the URL with redirection feature within the script using a certain URL shortener (chilp.it).
Figure 5 and Figure 6 show redirected phishing HTML making users log in. Because both scripts have the receiver’s e-mail address entered in the ID field, there is a chance that users enter their e-mail passwords without a second thought.
Figure 10 is the HTML file of the second phishing website that leaks login information. In this case, the file is not obfuscated and reveals the C2 URL within the script.
The cases of two e-mails show that they were sent by the same person and use a certain URL shortener in the attached HTML files. But how they operate is different, and there are different types of phishing pages that are ultimately connected.
Users must not open mails with unknown sources, and are recommended to update their anti-malware products to the latest version. Also, because the operation methods of phishing pages attempting to leak accounts are not much different from those that have been continually introduced in the ASEC blog, users must remain alert and not enter their account information on a webpage redirected from the attached files.
V3 Lite is currently responding by blocking URLs.
[Relevant IOC Info]