user-image
CertiK
Jan 18, 2024

Trap Phishing on Trusted Platforms: A New Phishing Trend in The Web3 World

 

Introduction

In the decentralized Web3 world, phishing software often finds it easier to seize control of users' assets by directly obtaining private keys or mnemonic phrases, in contrast to traditional Web2 applications.

We have identified a new form of active phishing within the Web3 ecosystem. This method strategically deploys phishing traps on influential platforms like exchanges and marketplaces to enhance the outreach and credibility of the phishing sites. These traps take various forms, such as deceptive web3 project job ads, enticing airdrops, and fabricated NFT sales from counterfeit project sites.

The strategy involves enticing users to divert from the official websites of these influential platforms to the phishing site. By sidestepping checks implemented by exchanges and marketplaces, attackers place their phishing trap links and rogue NFT items in locations where Web3 users tend to place more trust, leading to a decreased level of caution. Consequently, individuals falling prey to these phishing traps unknowingly download malicious software, resulting in the compromise of credentials and loss of crypto assets to attackers.

 

Social Engineering

Traditional Approach

The phishing team disguises itself as a Web3-based game development team, using platforms like YouTube, X, Telegram, and other common Web3 social channels to attract users to visit the game's official website (which is the phishing site). Users are encouraged to download the game client (indeed a malicious program). Once the user downloads and runs the malicious program, their wallet keys stored on the machine are stolen. Screenshot 2024-01-09 at 9.24.52 PM To enhance credibility, the team has gone to the extent of posting false job recruitment information. Even in the job descriptions, they continue attempting to lure users into visiting the phishing site and downloading malicious programs.Screenshot 2024-01-09 at 9.26.43 PM

Web3 Trap Phishing – A Newly Identified Approach with Web3 Characteristics

Similar to the common practice of offering a range of NFT items associated with Web3 games, this team also releases a series of NFT collections through channels for publishing NFT items. They leverage major trading platforms as endorsements to attract users to visit the phishing site and download the malicious client.

Taking OpenSea as an example, searching for the NFT keyword 'Astration' on OpenSea yields the corresponding NFT collection. In this collection, the provided official website address redirects users to a phishing site. Upon visiting the official website and downloading the game client, users unknowingly expose their private keys to theft. Screenshot 2024-01-09 at 9.29.17 PM

Users can also find this NFT in the NFT categories on the official websites of Coinbase, as illustrated in the following image.

Screenshot 2024-01-09 at 9.30.25 PM

After executing the malicious program

Regardless of the channel from which a user downloads and executes the malicious software, their wallet keys will be stolen, resulting in financial losses.

Readers interested in delving deeper into the technical details can explore the subsequent section on 'Malware Analysis' for a more comprehensive understanding.

 

Malware Analysis

We have captured multiple samples, and now we will focus on one sample for a brief analysis of its behavior and the targeted information it attempts to steal. Additionally, we will highlight subtle differences among other samples. Through continuous observation, it becomes evident that the team behind this malicious software is consistently updating it to evade detection by antivirus software.

Basic Information

Screenshot 2024-01-09 at 9.32.31 PM

 

Technical Analysis

Overview Diagram

Screenshot 2024-01-09 at 9.34.01 PM In broad strokes, the malware's central behavior can be categorized into three main components: Deceptive Password Acquisition, Reading Sensitive Information, and Compressing and Transmitting Data. The technical methods employed by the malicious software, while not excessively intricate, are typically depicted as illustrated in the diagram. Subsequently, we will delve deeper into the analysis of each phase.

Deceptive Password Acquisition

Screenshot 2024-01-09 at 9.34.51 PM

Upon double-clicking the installation program, a pop-up window appears, attempting to deceive users into providing their passwords.

Screenshot 2024-01-09 at 9.35.25 PM

Through reverse engineering analysis, it can be observed that this window is implemented using osascript and records the user's entered credentials.

Reading Sensitive Information

Firefox has implemented specific handling; one can identify the accessed files through distinctive strings in the code.

Screenshot 2024-01-09 at 9.36.33 PM

The following code lists some other target browsers and wallets vulnerable to the theft of sensitive information.

Screenshot 2024-01-09 at 9.37.09 PM

We won't delve into the code extensively here, but the core logic revolves around accessing the various wallet-sensitive data files based on their collected paths. It involves reading the contents of these files, preparing them for subsequent compression and transmission.

Compressing and Transmitting Data

Compressing the extracted sensitive information in preparation for transmission back to the server. Screenshot 2024-01-09 at 9.38.17 PM

After preparing the compressed archive, transmit it back to the server via an HTTP request.

Screenshot 2024-01-09 at 9.38.56 PM

The server address has been concealed using base64 encoding. By a simple base64 decode, we can obtain the actual IP address of the server. Which is 5.42.65.55.

The following code snippet illustrates the process of constructing the HTTP request string. Screenshot 2024-01-09 at 9.39.38 PM The sensitive data of end users will be sent as a payload for a POST request with the 'sendlog' to a remote server.

 

Captured Malicious Sample

VirusTotal Info

The analysis data from VirusTotal provides valuable insights into the impact of this sample and the recognition it has garnered from different antivirus software vendors. Out of the three malicious samples we captured, two are detectable on VirusTotal. Notably, one of them was submitted for analysis just before the writing of this document.

Screenshot 2024-01-09 at 9.41.19 PMScreenshot 2024-01-09 at 9.41.35 PM

Differences in Samples

The three samples vary in terms of programming languages employed, as well as in the structure of HTTP requests and the IP addresses utilized for data transmission.

Screenshot 2024-01-09 at 9.42.22 PM 1

 

Conclusion

In conclusion, Web3 exchanges must fortify their platforms through enhanced product background checks and more comprehensive risk warnings during product listings. The dynamic nature of the Web3 ecosystem demands a proactive stance in mitigating potential risks associated with listed products.

Simultaneously, users are encouraged to elevate their security awareness. As the Web3 space continues to evolve, users play a pivotal role in their protection. Heightened vigilance and a discerning approach to information received from exchanges are essential components of a robust defense against emerging threats. This collaborative effort between exchanges and users lays the foundation for a more secure Web3 environment. By reinforcing diligence in product vetting and fostering user awareness, the Web3 landscape can thrive with increased resilience against potential risks and malicious activities.

As we navigate the exciting terrain of Web3, let this be a call to action — a commitment to building a secure and trustworthy ecosystem that empowers users and ensures the longevity and prosperity of the decentralized future.

 

 

Original Link

Disclaimer
I confirm that I have read and understood the following: The information contained in this article is strictly the opinions of the author(s). This article was authored free from any form of coercion or undue influence. The content represents the author's own views and does not represent the official position or opinions of CrossAngle. This article is intended for informational purposes only and should not be construed as investment advice or solicitation. Unless otherwise specified, all users are solely responsible and liable for their own decisions about investments, investment strategies, or the use of products or services. Investment decisions should be made based on the user’s personal investment objectives, circumstances, and financial situation. Please consult a professional financial advisor for more information and guidance. Past returns or projections do not guarantee future results. This article is provided by CrossAngle’s third-party research partners. CrossAngle does not have any editorial control over this article and does not warrant the accuracy and timeliness of the information contained herein. This article may contain links to third-party websites, over which CrossAngle disclaims any control or responsibility.
Xangle or its affiliated partners own all copyrights of the written or otherwise produced materials and content provided on the platform. Any illegal reproduction of such content, including, but not limited to, unauthorized editing, copying, reprinting, or redistribution will result in immediate legal actions without prior notice.