Increasing Number of Bank-Themed Survey Scams

Examples of bank-themed survey scams seen by Netcraft

Examples of bank-themed survey scams seen by Netcraft

Netcraft has seen a large increase in survey scams impersonating well-known banks as a lure. These are often run under the guise of a prize in celebration of the bank’s anniversary, though in some cases a reward is promised just for participating.

These scams first came to Netcraft’s attention around 16 months ago, when businesses that were particularly useful during lockdown such as supermarkets, mobile phone networks, and delivery companies were targeted. The expansion of these attacks to use banks as a lure started in October 2021. To date we have seen over 75 distinct banks used as lures for these survey scams, with a global spread including banks from US, UK, Asia, and the Middle East.

Continue reading Increasing Number of Bank-Themed Survey Scams

The other victims of FluBot: How cybercriminals exploit WordPress to distribute malware

Netcraft has to date identified nearly 10,000 websites used in the distribution of the FluBot family of Android malware. As detailed in our previous articles on FluBot, these sites are unwittingly hosting a PHP script that acts as a proxy to a further backend server, allowing otherwise legitimate sites to deliver Android malware to victims. When visited by the intended victim, a “lure” is displayed that implores them to download and install the FluBot malware.

The most common lure themes are parcel delivery and voicemail messages, where the user is told to install the malicious app to track a parcel or listen to a voicemail message. One particularly interesting lure took advantage of FluBot’s infamy, by offering a fake “Android security update” that claimed to protect against the malware family. Users installing this “security update” would instead be infected with FluBot.

Most sites distributing FluBot malware also host legitimate content, suggesting they were compromised by the operators of this malware distribution network, without the knowledge of the site operator. While the use of unrelated domains makes the lures less convincing, as compared to domains specifically registered for fraud, it allows the malware distribution network to operate at a much larger scale.

These affected sites all have one factor in common: they run self-hosted WordPress instances. Netcraft believes the operators of this malware distribution network are actively exploiting well-known vulnerabilities in WordPress plugins and themes to upload malicious content onto insecure sites, joining a growing list of threat actors doing the same.




A collection of lures used by the FluBot distribution network

Continue reading The other victims of FluBot: How cybercriminals exploit WordPress to distribute malware

FluBot Android malware now targets UK banks

FluBot has built up a community of compromised Android phones in the UK since April and in the past 24 hours has commenced monetising them by sending overlays for British Banks.

FluBot first appeared in 2020, targeting mainly Spanish banks, but recently it has spread its reach, with Australian, German and Polish banks all affected within the last few weeks. UK banks are now firmly in its sights, with HSBC and Santander the first to be affected, and Lloyds and Halifax following shortly after.

Continue reading FluBot Android malware now targets UK banks

Resurgent FluBot malware targets German and Polish banks

Netcraft’s research into the Android banking malware FluBot confirms that its operations are expanding rapidly, with a spike in the number of malware distribution pages deployed, and finance applications affected in greater numbers.

In recent days new overlays have been distributed that target a number of Polish and German banks, only days after news that FluBot has begun to target Australian banks.

FluBot is distributed in the first instance using text messages, containing links to so-called “lure” pages: web pages unintentionally hosted by compromised web servers, commonly impersonating parcel tracking services, or voicemail notifications. Lure pages attempt to induce visitors to download the malware.

A scam text reading "( UPS ) Your package is arriving, track here"
"Your order will be delivered by DX today between 11:26 and 14:26. Track progress"
Text messages impersonating delivery companies, directing victims to FluBot lure sites

Continue reading Resurgent FluBot malware targets German and Polish banks

Netcraft phishing and cybercrime protection app for iOS available globally

Netcraft has released a new version of its phishing and cybercrime protection app for iOS. The app protects users around the world from online threats including phishing, JavaScript skimmers, fake shops, and coronavirus scams. The Netcraft app is available for download today on iOS, Android, and Amazon devices:

Download on the App Store

Available now on Google Play
Available at Amazon Appstore

Our iOS app protects against online threats, with new attacks blocked within 15 minutes of being identified as fraudulent by Netcraft. It offers a 28-day free trial of all features, after which a monthly or annual subscription can be purchased for $1.99 or $9.99 (£1.99 or £9.99).

You can use the app without a subscription to report suspicious sites to Netcraft with just a few taps, and automatically report URLs in SMS and iMessages from unknown senders.

Wherever you are, the app defends against phishing attacks targeting regional services such as governments and banks. In addition, it protects users against other types of online threat such as JavaScript skimmers on eCommerce sites, fake shops imitating well-known brands, new threats such as coronavirus scams, and attacks targeting global entities – such as cloud services, financial institutions, and social media.

Constantly updated protection against online threats

Continue reading Netcraft phishing and cybercrime protection app for iOS available globally

Protect against Shopping Site Skimmers and Fake Shops with the Netcraft Extension

The current coronavirus pandemic has resulted in the closure of many pubs, restaurants, and brick-and-mortar retail stores. Many purchases that would previously have been made in person now take place online. In research commissioned by Visa
, 89% of Britons have shopped online since the UK’s lockdown restrictions began, with 31% buying items online for the first time during this period. This increase in online shopping activity benefits criminal groups in that: smaller businesses newly reliant on online transactions provide attackers with a stream of inadequately-defended shopping sites to exploit, and buyers are far more likely to be driven to these compromised shops or to fake shops compared to before the pandemic.

JavaScript skimmers
run on compromised shopping sites. When shoppers enter their payment details, the skimmer secretly sends a copy to the attacker – potentially even if the customer does not complete the transaction. Even the most careful of users can be victims of these attacks, as they appear on compromised but otherwise well-intentioned shops with no visual indication of their presence.

Fake shops
are another threat. Shoppers seeking bargains may unknowingly find themselves on a fake shop which claims to offers the products they want at a highly discounted price, but the victim will subsequently only receive counterfeit goods, no goods at all, or have the transaction aborted after entering credentials which is equivalent to a phishing attack.

Fake shops also take advantage of the pandemic
by offering goods in high demand due to coronavirus, such as N95 masks. The FBI has released a Public Service Announcement
about an increase in online shopping scams involving the sale of counterfeit healthcare products such as Personal Protective Equipment (PPE). To date, Netcraft has blocked over a thousand such coronavirus-themed fake shops, 80,000 other fake shops selling all sorts of counterfeit goods, and around 3,500 compromised shops hosting JavaScript skimmers.

The Netcraft browser extension and mobile apps
provide protection against fake shops as well as legitimate shopping sites that have been compromised with JavaScript skimmers. When an extension or app user visits one of these dangerous shops, Netcraft will block access to the shop and alert them:

Visiting a fake shop without the Netcraft extension

Visiting a fake shop without the Netcraft extension

Visiting a fake shop with the Netcraft extension

Visiting a fake shop with the Netcraft extension

Continue reading Protect against Shopping Site Skimmers and Fake Shops with the Netcraft Extension

Fake shops are making a killing from counterfeit trainers

Online shopping has surged since lockdown started in March. Many of us, looking to be healthier, have headed online for sports equipment and a number of sportswear retailers have reported booming online sales. John Lewis recorded a 72% increase in total sports shoe sales, while Adidas and Puma have both seen an increase in ecommerce revenue.

Shoppers browsing online for the best deals, however, need to take care, as many people would be surprised at the scale of fake shops. Each day we find new fake shops designed to entice shoppers away from bona fide outlets, as many brands have yet to find effective countermeasures.

Counterfeit shoes, clothing and other accessories are estimated to lose the industry more than €26 billion each year in the EU alone, while the loss due to all online counterfeiting is estimated at $323 billion a year. The OECD estimated that over 3% of all imports worldwide are counterfeit.

Traditionally fake shops claim to sell luxury consumer goods at highly discounted prices. We have seen fake shops using at least three different models:

  1. Payment is accepted, but no goods are delivered.
  2. At the end of the checkout process, an error message is displayed such as “Out of Stock” and no transaction occurs. This is equivalent to a phishing attack, as the fake shop has the consumer’s credentials.
  3. Payment is accepted, and goods are delivered. The quality of goods varies between junk and identical to the bona fide item.

Trainers are the most counterfeited goods

We are currently block around 75,000 fake shops in our extension and apps. Of these, roughly half target a specific brand, such as Nike or Adidas. About 70% of the fake shops selling branded goods sell shoes, predominantly trainers.

Corroborating this, European customs authorities handle more cases of counterfeit sports shoes than any other type of product.

Breakdown of fake shop industries

Fake shops by type of goods sold

Continue reading Fake shops are making a killing from counterfeit trainers

Netcraft wins 2020 Queen’s Award for Enterprise

Netcraft has today received a Double Queen’s Award for Enterprise.

A Queen’s Award is the highest UK Government award for a British business. It
is awarded on the Queen’s Birthday each year, and, in different times, it would
include an invitation to a mass gathering at Buckingham Palace. The criteria set
by our Government searches for considerable progress sustained over a six year
period. This year, 128 companies received a Queen’s Award for International
Trade and 66 companies a Queen’s Award for Innovation.

Netcraft is one of three companies to receive a Queen’s Award in both
categories. The full list of winners is listed in the Queen’s Awards Press
Book

.

Continue reading Netcraft wins 2020 Queen’s Award for Enterprise

Netcraft Adds Coronavirus-related Cybercrime Protection to its Apps and Browser Extensions

Netcraft has added protection from Coronavirus-related cybercrime to its mobile apps
for Android and iOS, and to its browser extensions
for Chrome, Firefox, Opera, and Microsoft Edge. Websites containing these attacks will be blocked for those who ha… Continue reading Netcraft Adds Coronavirus-related Cybercrime Protection to its Apps and Browser Extensions