Poisoned Phishing Kit Steals From CriminalsPoisoned Phishing Kit Steals From Criminals

The phishing kit includes a back door that sends a copy of each victim's details back to the scam artists.

Thomas Claburn, Editor at Large, Enterprise Mobility

January 23, 2008

2 Min Read
information logo in a gray background | information

Proving the old adage that there's no honor among thieves, a group of Moroccan cybercriminals has released a phishing tool kit that steals information from would-be data bandits.

The group, which calls itself Mr-Brain, launched a Web site that offers easy-to-use phishing software, according to Netcraft security researcher Paul Mutton. Its apparent intent is to simplify the process of deploying a phishing site -- a Web site that appears to be legitimate but nonetheless includes hidden code designed to capture personal information like online banking login details.

The phishing kit, said Mutton, allows such sites to be deployed in as little as a minute. It includes templates to attack common phishing targets like Bank of America, eBay, PayPal, and HSBC.

The phishing kit also includes a back door. "Careful inspection of the configuration script reveals deceptive code that hides the true set of electronic mail addresses that are contacted by the kit -- every fraudster who uses these kits will unwittingly send a copy of each victim's details back to the Mr-Brain group," said Mutton in an online post.

The group uses the case sensitivity of PHP variable names to conceal the true nature of the toolkit's configuration script.

In an e-mail, Mutton observed that it's more typical for fraudsters to make money by selling phishing kits or trading them for credit card numbers. "This is quite often done via IRC chatrooms," he said. "Therefore, to see them being offered for free has to make you wonder what's in it for the authors -- why would they spend time making them solely for the benefit of other fraudsters? This is what makes people like me suspicious of the Mr-Brain kits, enough to warrant a bit of poking to see what they really do."

Mutton said he expects the kits will be snapped up by novice malicious hackers. "Most users of these phishing kits will be unlikely to notice the backdoor, because as far as they are concerned, the kits work properly," he said.

Mr-Brain, said Mutton, "has been responsible for a number of previous phishing attacks, and most of the e-mail addresses we've seen involved with it are Gmail ones."

The number of unique phishing Web sites reported by the Anti-Phishing Working Group in October 2007 was 34,266, an increase of more than 6,200 from September 2007. During October 2007, 92.5% of phishing attacks targeted financial services companies.

Read more about:

20082008

About the Author

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, information, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights