In a recent and alarming development, the SlowMist Security Team, in collaboration with Rabby Wallet, has uncovered a sophisticated phishing attack using Google Ads. This attack, aimed at unsuspecting cryptocurrency users, has raised concerns about the vulnerabilities of online advertising platforms and the potential for large-scale phishing schemes.

Background

The Rabby Wallet team first noticed something amiss when they discovered a Google Ad directing users to what appeared to be their official website. However, the team had not purchased any Google Ads, leading to suspicions that the ad was a part of a phishing scheme. Upon further investigation, it was revealed that while the ad initially directed users to the genuine Rabby Wallet website, it would, under certain conditions, redirect them to a phishing site.

How the Scheme Works

The phishing attack relied on a series of 302 redirects, a temporary HTTP status code used for redirection. The attackers set up a chain of redirects that would, under specific circumstances, lead users to a fake Rabby Wallet site. The initial redirect appeared legitimate, displaying the genuine Rabby Wallet URL. However, subsequent redirects, which were conditional based on the user’s location and browser information, would lead to a phishing site.

Technical Analysis

The attackers cleverly utilized Google’s Firebase short link service to create redirects that bypassed Google’s system checks. By setting up the initial redirect to point to a Firebase short link, they could then alter the final destination without alerting Google. This allowed the phishing scheme to remain active and undetected for a significant period.

Phishing Sites and Malware

The phishing sites were meticulously designed to mirror the Rabby Wallet website, making it difficult for users to discern the difference. Additionally, malware was deployed to infect users’ computers. The malware, written in Russian and disguised as a legitimate desktop wallet installer, was designed to remain undetected and had been identified as a Trojan backdoor by multiple antivirus engines.

Google’s Role and Advertising Mechanism

The effectiveness of this phishing scheme highlights weaknesses in Google’s advertising system. Google Ads, which can be easily set up with a Google account, allows advertisers to specify the final destination of their ads. The attackers took advantage of this by initially directing users to the genuine Rabby Wallet site but later altering the redirects to point to phishing sites. Google’s lack of real-time monitoring of redirects facilitated the scheme.

Countermeasures and Prevention

Rabby Wallet and the SlowMist Security Team are urging users to exercise caution when clicking on any links, especially those appearing in online ads. It is essential to verify the authenticity of websites by checking their URLs directly and not solely relying on search results. In the event of a suspected phishing attack, users should immediately move their funds to a secure location and conduct a thorough antivirus scan.

Conclusion

The Rabby Wallet phishing attack serves as a stark reminder of the evolving tactics employed by cybercriminals. As online advertising continues to be a lucrative avenue for both legitimate businesses and malicious actors, it is imperative for users to remain vigilant and for advertising platforms to enhance their security measures. The collaboration between Rabby Wallet and the SlowMist Security Team in uncovering this scheme demonstrates the importance of proactive cybersecurity efforts in protecting users from sophisticated phishing attacks.


>>> Read more <<<

Views: 0

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注