Tuesday, January 21, 2025
Homecyber security16Shop - Malware-as-a-service Phishing Toolkit Attack PayPal Users With Anti-Detection Techniques

16Shop – Malware-as-a-service Phishing Toolkit Attack PayPal Users With Anti-Detection Techniques

Published on

SIEM as a Service

Follow Us on Google News

A prolific phishing kit distribution network dubbed “16Shop” believed to be active since 2018 and developed by a hacking group called the “Indonesian Cyber Army.”

It’s a huge first attack targeting Apple kits and then attacked Amazon customers before the prime day in 2019.

The analysis also explained that 16Shop is using three different anti-bot and anti-indexing features. 

16Shop Phishing Kit Service

16Shop offers services that are similar to software-as-a-service (SaaS), where the users can purchase the kits and distribute them for a cost.

Earlier this January, ZeroFOX Alpha obtained a phishing kit that targets PayPal customers along with Apple and Amazon, also traces are indicating the possibility of an American Express kit.

This indicates that threats actors behind the Phishing Kit Distribution network continuously upgrading its features and attack methods.

The latest version of 16Shop obtained by the ZeroFOX Alpha Team includes several features such as an ability to block automated crawlers for security vendors, web indexers and Antibot function to check the visitor is a bot or not.

“The antibot website is in English as well as Indonesian. This is an interesting observation as the 16Shop authors have been attributed to be Indonesian, and there is Indonesian littered throughout their code.”

Here is the new products panel page

The new PayPal kits are designed aiming to steal the users Personally Identifiable Information as much as possible.

The operators of the phishing kit are provided with a panel to track the user click’s, login, card details, banking details, and bot detected.

The Phishing kit sends the collected information to its operators via SMTP to their email box, for now, the PayPal kit only supports few languages only.

This Phishing kit lets any low-level technical operators launch sophisticated attacks.

“Phishing kits are becoming more popular, as they allow an ecosystem where more technical cybercriminals sell services and reduce the barrier to entry for less technical operators. These kit authors use product features and marketing tactics from SaaS products to advertise, sell, deploy, maintain and update their products. ” Researcher said.

Also Read: Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced...