Saturday, March 29, 2025
Homecyber security16Shop - Malware-as-a-service Phishing Toolkit Attack PayPal Users With Anti-Detection Techniques

16Shop – Malware-as-a-service Phishing Toolkit Attack PayPal Users With Anti-Detection Techniques

Published on

SIEM as a Service

Follow Us on Google News

A prolific phishing kit distribution network dubbed “16Shop” believed to be active since 2018 and developed by a hacking group called the “Indonesian Cyber Army.”

It’s a huge first attack targeting Apple kits and then attacked Amazon customers before the prime day in 2019.

The analysis also explained that 16Shop is using three different anti-bot and anti-indexing features. 

16Shop Phishing Kit Service

16Shop offers services that are similar to software-as-a-service (SaaS), where the users can purchase the kits and distribute them for a cost.

Earlier this January, ZeroFOX Alpha obtained a phishing kit that targets PayPal customers along with Apple and Amazon, also traces are indicating the possibility of an American Express kit.

This indicates that threats actors behind the Phishing Kit Distribution network continuously upgrading its features and attack methods.

The latest version of 16Shop obtained by the ZeroFOX Alpha Team includes several features such as an ability to block automated crawlers for security vendors, web indexers and Antibot function to check the visitor is a bot or not.

“The antibot website is in English as well as Indonesian. This is an interesting observation as the 16Shop authors have been attributed to be Indonesian, and there is Indonesian littered throughout their code.”

Here is the new products panel page

The new PayPal kits are designed aiming to steal the users Personally Identifiable Information as much as possible.

The operators of the phishing kit are provided with a panel to track the user click’s, login, card details, banking details, and bot detected.

The Phishing kit sends the collected information to its operators via SMTP to their email box, for now, the PayPal kit only supports few languages only.

This Phishing kit lets any low-level technical operators launch sophisticated attacks.

“Phishing kits are becoming more popular, as they allow an ecosystem where more technical cybercriminals sell services and reduce the barrier to entry for less technical operators. These kit authors use product features and marketing tactics from SaaS products to advertise, sell, deploy, maintain and update their products. ” Researcher said.

Also Read: Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...