March 4, 2023, 4:24 p.m. | Dancho Danchev

Security Boulevard securityboulevard.com




Dear blog readers,


I've recently stumbled upon a pretty interesting phishing campaign including the actual hosting infrastructure behind the campaign where I've decided to share my findings with everyone in particular the fact that the campaign including several other which I'll profile in this post are currently hosted on Ipfs's Web 3.0 infrastructure.


Sample screenshots include:







Sampe URL redirection chain: 
hxxp://trustwave-ibank[.]com/l/LiinkedInhardest/900/ -> hxxp://kit[.]fontawesome[.]com/585b051251[.]js (b5a82299925ac96a1454732ab97f2bb5) - 104[.]18[.]23[.]52

Related MD5s known to have been dropping the same identical phishing infrastructure javascript obfuscation …

abuse analysis blog campaign clustering fact findings fraudulent hosting infrastructure ipfs malicious osint phishing phishing campaign profile rogue screenshots share web web 3 web 3.0

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto