The ASEC analysis team recently identified that multiple malicious domains targeting normal websites of the financial sector had been created.
From early November, we detected multiple distribution cases of phishing emails impersonating Naver Help. Through these, we had been monitoring the malicious URL that was included in these emails.
The sender’s username was ‘Naver Center’ and the emails had a variety of topics to deceive users, including notifications for changes to contact details, creation of a new one-time password, login from unfamiliar locations, full mail storage, and blocked access attempts.
Clicking the ‘Check phone number’ in the above image brings up a fake Naver login page and when account credentials are entered into this page, a typical phishing attack is initiated where the account credentials are forwarded to a page designated by the threat actor.
One thing to note here is that n-e.kr was used as the top-level domain as in the past, AhnLab had identified a domain with a similar format being used in the Kimsuky group’s C2.
[Top-level domains frequently used in Kimsuky-related attacks]
- kro.kr and more
We first identified the IP where the phishing domain used in the attack was being resolved and found that there were multiple other related domains linked to the same IP. (As of December 14th, 2022, only a portion of the domains in the following list are found to be live.)
# Resolving IP : 210.16.120[.]212 [Singapore]
- wvw1.user2list.kro[.]kr and more
Among the top-level domains, n-e.kr / p-e.kr / o-r.kr / kro.kr are the most common.
The top-level domains were resolved using the same two IP addresses. A portion of the relevant domains collected through AhnLab’s infrastructure is as follows.
There are a lot more malicious domains aside from those listed below.
# Resolving IP : 139.99.89[.]153 [Singapore] / 172.104.112[.]214 [Japan]
Even now, some live domains still exist, and certain pages enabled the downloading of malicious APK files.
|IP||Country||Malicious Domain||Target (assumed)||Live Status
(As of Dec 14, 2022)
|smartshinhan.kro[.]kr||O||Downloads malicious APK|
|kbank.o-r[.]kr||K Bank||O||Downloads malicious APK|
|kamco.kbloan.r-e[.]kr||KAMCO (Korea Asset Management Corporation)||O||Downloads malicious APK|
|kakaosaving.kro[.]kr||KakaoBank||O||Downloads malicious APK|
|172.104.112[.]214||Japan||naver.o-r[.]kr||Naver||O||Impersonates the Naver Home Page|
|digital.pepperbank.kro[.]kr||Pepper Savings Bank||O||Downloads malicious APK files|
|inglife.kro[.]kr||Orange Life (formerly ING Life)||O|
|kamco.kbloan.kro[.]kr||KAMCO (Korea Asset Management Corporation)||O|
|heungkukfire.p-e[.]kr||Heungkuk Fire & Marine||O|
The downloaded malicious APK files were all identified to be malicious apps used for voice phishing. Their resolutions were optimized for mobile devices, and connecting to them with a mobile device displays the following pages.
The above image shows the download pages of malicious apps disguised as those of K Bank/Shinhan Bank/Korea Asset Management Corporation (KAMCO)/KakaoBank/Pepper Bank from left to right, and clicking the ‘Download App’ or ‘Apply’ buttons on each page downloads the malicious app.
This malicious app masquerades as financial institutions and includes the feature where if a device with this app installed makes a call to a particular number, the outgoing call is hijacked and routed to a number designated by the threat actor. When the app is opened, it leads users to download and install an app disguised as the ‘V3 mobile plus’ app, which contains malicious features.
As users can be led to malicious URLs through such clever methods using phishing emails, users must refrain from opening emails or text messages from unknown sources.
AhnLab’s anti-malware product, V3, detects and blocks the domains below as phishing websites.
Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.
[…] Phishing Attacks Impersonating Famous Korean Banking Apps […]