Fake Google reCAPTCHA

A new malware campaign impersonates a fake Google reCAPTCHA to deliver banking malware. The campaign specifically targeted a Polish bank.

Security researchers from Sucuri discovered the sophisticated phishing campaign employed with both the impersonation and panic/bait techniques.

Malware Infection – Fake Google reCAPTCHA

The malware infection starts with the fake confirmation receipt of the recent transaction that includes a link to the malicious PHP file.

Attackers designed the email in the way to create a panic situation to customers asking confirmation for an unknown transaction.

Generally, the phishing email contains a log in which grabs the user’s login, but the design here is unique, the campaign instead serves a fake 404 error page to its that tracks the victims user-agents.

“We see that they are limited to crawlers associated with Google, indicating that the attackers must not be too worried about other search engines.” reads Sucuri blog post.

Fake Google reCAPTCHA

Once the user-agent got filtered then the PHP code loads a fake Google reCAPTCHA that relies on static elements. The PHP determines which malware to be dropped on the victim’s machine based on user-agent.

The malicious page rechecks the victim’s user-agent.zip dropper or a malicious .apk based on the visitor’s device.

If it detects an android device then it delivers the .apk file, else it passes another request to download the .zip file to victim’s device.

Once the malware got installed in the device it starts intercepting 2FA through SMS to grab the login credentials.

Also Read:

Google Launches phishingquiz To Test That you Can Identify Phishing Emails

New Phishing Attack Taking Advantages of Vulnerability in Office 365 to Bypass all of Microsoft’s Security

Leave a Reply