#netcraft

2025-12-06

📢 Le NCSC teste « Proactive Notifications » pour alerter les organisations UK sur leurs vulnérabilités exposées
📝 Selon BleepingComputer, le NCSC (National C...
📖 cyberveille : cyberveille.ch/posts/2025-12-0
🌐 source : bleepingcomputer.com/news/secu
#NCSC #Netcraft #Cyberveille

2025-12-05

#Netcraft describes itself as "digital risk protection" and "Advanced Cybercrime Defense". Having been flagged by them 4 times now, and each time with an easily recognizable false positive (they also pinged our provider, which then threatened with actions – and added our domain to their blacklist right away!), I'm quite fed up with their seemingly incompetence: first shoot, then ask. All automated, obviously no humans involved on their end.

My experience so far: gitlab.com/-/snippets/4909577

(1/2)

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

Next week, I'm speaking at #Saintcon about #phishing, #smishing, #quishing (all the -ishings) and propose a broad-based possible solution that could end this problem forever. Nothing big.

If you're going to be there, you can find me in Track 2 at 2:30pm, or most of the rest of the time at the @SAINTCON @malwarevillage Community, where we will be hosting two of our contests (MARC I and BOMBE) and encouraging people to consider the field of malware analysis and threat research as a career.

We also will have minibadges, both at #MalwareVillage and at the #Netcraft booth. If you're a #minibadge fan/collector, you aren't going to want to miss out on the Netcraft minibadge, which is awesome. Just drop by the booth to get a kit to build one. Tell them Spike sent ya.

Until then, stay safe, and please tell everyone you know, don't click links to tax refunds or toll road fees you get on your phone.

/END

netcraft.com/blog/taxpayers-dr

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

And I just wanted to give a quick shoutout to our engineering team for noticing this bizarre trick that all of the #phishing pages do that we connect to this #LoggerEIO group.

The phishing kit in use has several pages that the victims are expected to click through. As one enters information onto the first page, then clicks a Continue button, the browser initiates a WebSocket connection with the server, and transmits the data inside of that WebSocket connection.

It isn't exactly encryption, but more obfuscation: The compression, while reversible, does have the effect of obfuscating the content of the exfiltrated data. That little bit of effort might prevent a Data Loss Prevention (DLP) tool from recognizing outbound sensitive data before it's too late.

And the reason we call them #LoggerEIO is because all of the sites that Netcraft connects to this campaign do this on the same URI string: The page makes a connection to the path /logger/?EIO=4&transport=websocket in its GET request - only when the victim sends the data.

/6

#smishing #phishing #NetcraftConfirmsIt #Netcraft #threatresearch #WebSocket

Each time the victim submits data, the site initiates a WebSocket connection and then uses the "permessage-deflate" method to compress the data into a format that isn't as readily identifiableHeaders from the session where the WebSocket connection is initiated by the browser, when the victim enters information into the page. The information is compressed using the "permessage-deflate" method, which may make the contents less identifiable as sensitive information to a DLP product.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

Germany was not the only non-US country represented in the #LoggerEIO #smishing attack (so far).

There was one version of a page claiming to be the Spanish highway authority, Dirección General del Tráfico (DGT), that warns you owe a 100 Euro fine (multa) for some kind of driving infraction you committed, that must be paid within 24 hours.

More recently, I spotted a flood of pages that claim to be from the UK government's Winter Fuel Payment program. The real program helps impoverished people not freeze to death in winter by subsidizing the high cost of heating. But this page simply wants your credit card to "test" charge your card for £1 on the promise that you'll get up to £300.

/5

#smishing #phishing #roadtoll #HighwayRobbery #WinterFuelPayment #UK #spain #espana #Netcraft #NetcraftConfirmsIt #NetcraftResearch #Germany

A smishing version of Spain's DGT (Dirección General del Tráfico) tells you that you have fewer than 24 hours to pay a 100 Euro fine for...something bad you didThe fake UK Winter Fuel Payment site wants to charge your card 1 pound as a test.The fake UK Winter Fuel Payment site asks for a lot of personal information, including your name, address, email, phone number and credit card data.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

Having recently returned from a trip to #Germany, where I spoke at #VirusBulletin, I have become more familiar with the appearance of some German government operated websites.

The Bundeszentralamt für Steuern (or BZSt), Germany's federal tax authority, is also represented in these #TaxScam #phishing pages.

Bizarrely, #LoggerEIO have decided to clone the template of one of the US-themed versions of the #smishing page which prominently features a banner image of a US form #1040 #tax return, and the corner of a $20 bill, neither of which (I suspect) the #BZSt use for tax filing in that country.

Whoopsie! Or, as my German friends might say, Hoppla!

/4

#smishing #phishing #netcraft #NetcraftConfirmsIt #Oops

A smishing page that purports to be the German Bundeszentralamt für Steuern (or BZSt), Germany's federal tax authority, offering Rückerstattungsdienste (refund services)A comparison of the smishing pages created to mimic the appearance of Alabama, Minnesota, Tennessee, and...Germany's Bundeszentralamt für Steuern (or BZSt) federal tax authority shows they all use the same image of a US IRS form 1040 tax return
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

In this #scam, the #smishing message informs you that you are owed a reimbursement or refund on overpaid state taxes. The #LoggerEIO group seems to have latched on to the idea of using individual states as the lure, rather than the federal #IRS, which is an interesting choice.

In the pages I looked at, the following states were represented with custom #phishing pages that use the same stylesheet, color scheme, and logos of the state tax agency they're impersonating.

Targeted states include Alabama, California, Connecticut, Delaware, Florida, Maryland, Massachusetts, Michigan, Minnesota, Montana, New Jersey, New York, Ohio, Texas, Tennessee, Washington, and Wisconsin.

/3

#smishing #netcraft #NetcraftConfirmsIt #taxrefund #taxrefundscam

A smishing page that purports to be from the state of New York's Department of Taxation and FinanceA smishing page that purports to be from the state of MassachusettsA smishing page that purports to be from the state of Delaware's Division of Revenue (DOR)
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

First of all, this seems to be part of a much wider #smishing campaign that people are more familiar with: Fake road toll collection #scams

These have been a nuisance all year, and some of the sites hosting the same #phishing kit appear to be using that same ruse, simultaneously with the new one.

Did you get a message telling you that you owe $6.99 (or $6.69 - nice) in tolls? Probably part of this larger network of scammers.

Note how they have expanded to a variety of different locales: the City of Los Angeles, Seattle, Columbus (Ohio), and even the Canadian province of Ontario are all reflected, as well as the E-ZPass and SunPass multi-state toll payment systems, which together cover most of the US states that operate toll roads.

/2

#phishing #fraud #roadtoll #tollscams #netcraft #NetcraftConfirmsIt #EZPass #SunPass

A smishing (SMS phishing) page that claims you owe $6.99 in road tolls to the Los Angeles Department of Transportation, using LADOT's logo and designA smishing (SMS phishing) page that claims you owe $6.69 in road tolls to ServiceOntario, the driver's license agency for the Canadian province, using ServiceOntario's logo and designA smishing (SMS phishing) page that claims you owe $6.69 in road tolls to the SunPass road toll collection system used by 22 southeastern US states
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-10-16

Happy Thursday! I'm celebrating the publication of my first blog post at @Netcraft as Principal Threat Researcher with a story about...#smishing for tax refunds.

Since the beginning of last month, a threat actor we're calling #LoggerEIO began registering domains for use in #phishing attacks.

They're now up to more than 850 domains registered, with thousands of websites in use (using a variety of subdomains) that dangle the prospect of a refund of state income tax overpayments as a lure.

Here's a quick 🧵 about it.

netcraft.com/blog/taxpayers-dr

#ThreatResearch #NetcraftConfirmsIt #Netcraft

2025-07-03

📢 Les chatbots IA facilitent le phishing selon Netcraft
📝 L'article publié par The Register met en lumière une nouvelle menace en cybersécurité identifiée par l'entreprise de renseignement sur les menaces, Netcraft...
📖 cyberveille : cyberveille.ch/posts/2025-07-0
🌐 source : go.theregister.com/feed/www.th
#Netcraft #chatbot #Cyberveille

teledyn 𓂀teledyn@mstdn.ca
2025-03-13

@davidho.bsky.social

It would be interesting to see the spread of HTTP 451 Unavailable For Legal Reasons by country over time. I've pinged #netcraft to ask if they can add a tally for this code.

valentijn scholtenvalentijn@infosec.exchange
2025-01-20

Does anyone here have any contacts at either @netcraft or the Microsoft Edge/Smartscreen team?

Someone in my network had their domain incorrectly marked as a phishing domain by Netcraft. Netcraft acknowledged their mistake, but refuse to help recover/clear the domain at Microsoft and other downstream parties using the Netcraft feeds.

This has been ongoing for 5 days now. #netcraft #smartscreen

netcraft warning

Fake web stores and evolving cyberattacks pose new perils for holiday shoppers, according to recent reports. jpmellojr.blogspot.com/2024/11 #HolidayShopping #OnlineFraud #ECommerce #Netcraft #Fortinet #FortiGuardLabs

:mastodon: deciodecio@infosec.exchange
2024-09-21

Tiens, Netcraft a intercepté et analysé les techniques d'opération des cybercriminels spécialisés dans l'arnaque au QR code, une méthode ayant sévi aussi en Suisse romande à la fin juin / debout juillet dans le parking où des autocollants ont été placés frauduleusement.
⬇️
"Faux code QR dans les parkings: l'arnaque touche tout le canton"
👇
20min.ch/fr/story/vaud-faux-co

Il est fort probable qu'il s'agisse du même groupe (roumain selon la langue du code analysé par Netcraft) ayant opéré au Royaume-Uni (et en France) au même moment, et de la même campagne, au vu de la période et des découvertes de Netcraft.

Ils ont probablement recruté de la "main-d'œuvre" locale pour coller les autocollants en UK , Suisse et France..., en ciblant les parkings en se basant simplement sur la distribution géographique des parking utilisant la solution PayByPhone en Europe.

👀

"The phishing websites contain internationalization files for English, French, German, Italian, and Romansh (spoken in Switzerland), indicating that this attack is being deployed on a trans-European scale. This backs up news reports from both Switzerland and France where have been found linking to the same phishing websites "

"Les sites de phishing contiennent des fichiers d'internationalisation pour l'anglais, le français, l'allemand, l'italien et le romanche (NDR 😳) (langue parlée en Suisse), ce qui indique que cette attaque est déployée à l'échelle transeuropéenne. Cela confirme les rapports d'information provenant de la Suisse et de la France qui ont été trouvés en lien avec les mêmes sites d'hameçonnage."

Analyse complète de Netcraft
⬇️
"Problems in the Parking Lot: Threat Actors Use IRL Quishing to Target Travelers"
👇
netcraft.com/blog/irl-quishing

Selon le timing rapporté par Netcraft :

  • 19 juin : début de l'arnaque, les premiers sites de phishing apparaissent mais sont rapidement mis hors ligne après une semaine.
  • 28 juin : réapparition de l'arnaque avec un nouveau nom de domaine.
  • 2 juillet : enregistrement de deux nouveaux domaines redirigeant vers les sites initiaux.
  • 27 juillet : alternance continue de sites mis en ligne puis hors ligne.
  • Début août : de nouveaux domaines sont enregistrés régulièrement, certains ne restant en ligne que brièvement.
  • Mi-août : tous les sites de phishing connus sont désactivés, l'acteur malveillant enregistre de nouveaux domaines avec des variations (comme parkbyphone au lieu de paybp), ces sites ne restent en ligne que quelques jours.
  • Fin août et au-delà : le même schéma persiste avec l'utilisation de nouveaux TLDs pour éviter la détection (comme .live et .online), chaque site ne restant actif que quelques jours.

Pendant cette période (du 19 juin au 23 août) les chercheurs de Netcraft ont trouvé que 10 000 utilisateurs ont accédé à ces sites malveillants entre le 19 juin et le 23 août, parmi lesquels beaucoup pourraient être des victimes ayant scanné les faux QR codes. Sur l’un des sites, 2 199 soumissions de formulaires ont été enregistrées, impliquant potentiellement des détails de carte de paiement.

Détails techniques observées pour les domaines frauduleux:

Enregistrés via NameSilo
Using .info, .click, .live, .online, and .site TLDs
Protected with Cloudflare (NDR of course, toujours présents dans ces phishings 🤬)

#CyberVeille #quishing #Suisse #netcraft #arnaque

"Des autocollants sont posés sur les affichettes officielles."
L'image montre un panneau de signalisation de parking avec une étiquette officielle pour le service "PayByPhone", qui permet de payer le stationnement par téléphone mobile. Au centre de l'image, un autocollant contenant un code QR est visible, et ce code QR semble être placé par-dessus l'affichette officielle. Un cercle rouge a été ajouté autour du code QR, mettant en évidence l'emplacement exact de l'autocollant frauduleux.
teledyn 𓂀teledyn@mstdn.ca
2024-08-30

To no one's surprise, the plot is another hockey stick

Scam Sites at Scale: LLMs Fueling a GenAI Criminal Revolution | #Netcraft
netcraft.com/blog/llms-fueling

teledyn 𓂀teledyn@mstdn.ca
2023-11-21

Fake Online Stores See A 135% Spike As Black Friday And Holiday Shopping Approaches | #Netcraft
netcraft.com/blog/fake-online-

teledyn 𓂀teledyn@mstdn.ca
2023-11-13

it comes as no surprise that cybercriminals are keen to exploit the media hype (and consumer naivety), and the domain registrars keen to capitalize on both

The rise of .ai: cyber criminals (and Anguilla) look to profit
netcraft.com/blog/the-rise-of-

#Netcraft #ai #cybercriminals

2023-09-16

@Voka
@kuketzblog @rufposten
Ja, kenne ich und nutze ich gelegentlich auch.

Gestern habe ich noch das Extension gefunden. Da kann man sich auch einen (fast zu) ausführlichen Report ausgeben lassen.

Sowas in der Richtung für maximale Transparenz für alle... 😉

addons.mozilla.org/de/firefox/

Frank Filipponefrankfil@aus.social
2023-07-20

Un-fucking-believable …

#Netcraft to one of my clients: You are hosting a #phishing site at [link] targeting [online service]! Take it down now! NOW!!!

Me on behalf of my client: No you idiots we are #SelfHosting a copy of their online service. See [link to product page] where you can buy this option.

Netcraft several hours later: Umm yeah sorry that was a mistake we are sending retraction notices to all the parties we notified.

My client: 🤬🤬🤬

2023-03-24

@zweije @Njames Ah, yes. #Netcraft confirms it. Online surveys can be biased /s 😏

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst