@0xfeedc0fe@infosec.exchange
@cR0w@infosec.exchange https://github.com/g0d33p3rsec/phishing/wiki/unknown-phishing-kit-cluster offers an overview but is a little out of date. I started tracking them after receiving a pair of lures to my community college student email from two separate compromised accounts within a week. The group seems to use compromised domains on shared hosts but always uses a common host for the images. You can search https://urlscan.io/search/#imagizer.imageshack.com* and look for URIs with base64 endpoints to quickly find their current host. It look like they're currently using bursaparkeustasi[.]com, they were at yoraraenergie[.]co[.]za before then. I'll try to enumerate the current lures as that one has been in use for some time. Looking at https://urlscan.io/result/01985c2d-231b-71f8-adda-6184531ad94d/#transactions shows the base64 decodes to path within the /imports directory that, from what I can tell, is used for individual campaigns. Additional evidence for it being a service can be seen in the POST data to event.php, for example: https://urlscan.io/responses/19c52c2d9fd17b70cb733a4077bac38e1a4706943850fbd83b831f2bd0eedd62/
The json includes fields for client and amount.
@cR0w@infosec.exchange
@0xfeedc0fe@infosec.exchange Do you want to take that to DM in case anyone is monitoring?