all InfoSec news
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis
Security Boulevard securityboulevard.com
Dear blog readers,
I've recently stumbled upon a pretty interesting phishing campaign including the actual hosting infrastructure behind the campaign where I've decided to share my findings with everyone in particular the fact that the campaign including several other which I'll profile in this post are currently hosted on Ipfs's Web 3.0 infrastructure.
Sample screenshots include:
Sampe URL redirection chain:
hxxp://trustwave-ibank[.]com/l/LiinkedInhardest/900/ -> hxxp://kit[.]fontawesome[.]com/585b051251[.]js (b5a82299925ac96a1454732ab97f2bb5) - 104[.]18[.]23[.]52
Related MD5s known to have been dropping the same identical phishing infrastructure javascript obfuscation …
abuse analysis blog campaign clustering fact findings fraudulent hosting infrastructure ipfs malicious osint phishing phishing campaign profile rogue screenshots share web web 3 web 3.0