Loading, Please Wait...

CST: 18/07/2019 04:47:12   

Massive Gift Card-Motivated Campaign Targets Victims with Commercially Available Tools

21 Days ago

SAN FRANCISCO, June 26, 2019 (GLOBE NEWSWIRE) -- RiskIQ, the global leader in attack surface management, today published a threat intelligence report detailing its discovery of a sophisticated, far-ranging threat campaign using commercially available and open-source marketing tools to launch phishing attacks against an array of organizations, many of which deal with gift cards.

This threat group's activities initially surfaced when investigative journalist Brian Krebs reported on the breach of IT supplier Wipro on his website "Krebs on Security," explaining how Wipro's IT systems were compromised and used to attack the company's customers. However, RiskIQ data pointed to this attack being far from an isolated incident.

The report shows how the campaign is, in reality, a highly targeted and well-orchestrated operation with a reach that far exceeds the compromised infrastructure of Wipro and involves a long list of targets dating back to 2016. Although attribution cannot be confirmed, the group's numerous concurrent attacks display hallmarks of some state-sponsored activity such as precision, organization, and, likely, a financial motive.

Infrastructure overlap in PDNS, WHOIS, and SSL certificate data sets allowed RiskIQ researchers to profile this group and surface and connect its infrastructure.

"With RiskIQ's data-collection grid and unique external view of threat actor operations, we could piece together a more complete picture of this group and their attack campaigns, tools, and possible motives," said Yonathan Klijnsma, Head Researcher at RiskIQ. "The sheer scale of the infrastructure involved in this campaign and the concerted effort to attack so many different organizations at once is both impressive and disturbing."

Report highlights include:

  • The group leveraged widely used email marketing and analytics tools to create effective email phishing campaigns and appear legitimate to targets' network security.
  • The group primarily targets major gift card retailers, distributors, and card processors.
  • With access to this gift card infrastructure, the attackers use money transfer services, clearinghouses, and other payment processing institutions to monetize.
  • One of the PowerShell scripts used by the group, BabySharkPro, is often associated with North Korean threat activity. However, this may have been a false flag put in place to mislead researchers.
  • Subsequent attacks on IT infrastructure organizations like Wipro represent broader targeting by the threat group likely in an attempt to widen its reach.

Download the full report here: https://www.riskiq.com/research/gift-cardsharks/

About RiskIQ

RiskIQ is the global leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social, and mobile exposures. Trusted by thousands of security analysts, security teams, and CISOs, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action. Its software protects businesses, brands, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.
Visit https://www.riskiq.com or follow us on Twitter. Try RiskIQ Community Edition for free by visiting https://www.riskiq.com/community/

© 2019 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are the property of their respective owners.

Contact
Holly Hitchcock
Front Lines Media
805-801-9798
Holly@FrontLines.io

Is your business listed correctly on America’s largest city directory network of 1,000 portals?