Thursday, February 27, 2025
Homecyber securityCryptoChameleon Kit With Group of Tools Propagate Phishing Quickly into Infrastructure

CryptoChameleon Kit With Group of Tools Propagate Phishing Quickly into Infrastructure

Published on

SIEM as a Service

Follow Us on Google News

CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to collect personal data such as usernames and passwords of mobile phone users.

A thorough investigation has exposed many CryptoChameleon fast-flux indicators designed to attack leading cryptocurrency platforms like Binance and Coinbase, among others. These indicators could be indicative of future attacks targeting their clients.

Cybersecurity researchers at SilentPush recently identified CryptoChameleon Kit with tools that propagate phishing quickly into infrastructure.

Technical analysis

In February 2024, Silent Push discovered malicious CryptoChameleon phishing kit activity targeting the FCC, Binance, Coinbase, and others through email, SMS, and voice attacks. 

The kit leverages fast-flux DNS evasion techniques, using DNSPod nameservers to cycle through IPs rapidly, bypassing traditional IOC-based defenses. 

CryptoChameleon impersonates various brands across sectors to harvest credentials and data. 

Analysis reveals command and control infrastructure details and targeted organizations embedded within the phishing pages. 

All-in-One Cybersecurity Platform for MSPs to provide full breach protection with a single tool, Watch a Full Demo 

Here below we have mentioned the CryptoChameleon targets:-

  • Yahoo
  • Outlook
  • Gemini
  • Kraken
  • Apple / iCloud
  • Twitter
  • Binance
  • Uphold
  • LastPass
  • Google/Gmail
  • AOL

Here below we have mentioned the phishing pages:-

Swan phishing page (Source - SilentPush)
Swan phishing page (Source – SilentPush)

Kraken phishing page (Source - SilentPush)
Kraken phishing page (Source – SilentPush)
Ledger phishing page (Source - SilentPush)
Ledger phishing page (Source – SilentPush)
Apple phishing page (Source - SilentPush)
Apple phishing page (Source – SilentPush)
Gamdom phishing page (Source - SilentPush)
Gamdom phishing page (Source – SilentPush)

The Silent Push malware, notorious for using DNSPod.com to carry its malicious architecture, conducted IP diversity queries with set parameters to navigate CryptoChameleon’s fast-flux DNS architecture. 

For this analysis, instead of using traditional IOCs, it employed a first-party database tracking the underlying attack infrastructure. T

his enabled researchers to map out hosting providers, ASNs, and global infrastructure that are actively being used by CryptoChameleon phishing campaigns.

Here below, we have mentioned all the associated domains:-

  • 76153-coinbse[.]com
  • 81758-coinbse[.]com
  • 81920-coinbse[.]com
  • 81926-coinbse[.]com
  • 81958-coinbse[.]com
  • 826298-coinbse[.]com
  • 83216-coinbse[.]com
  • 837613-coinbse[.]com
  • 83956-coinbse[.]com

Besides this, researchers affirmed that community and enterprise users can leverage Silent Push’s IP diversity queries and web scanning capabilities. 

This will allow them to connect disparate data points and gain comprehensive visibility into CryptoChameleon’s tactics, techniques, and procedures.

Get special offers from ANY.RUN Sandbox. Until May 31, get 6 months of free service or extra licenses. Sign up for free.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...