Saturday, December 21, 2024
HomeCyber CrimePhishing-as-a-Service Platform Lets Anyone Launch Own Phishing Campaigns

Phishing-as-a-Service Platform Lets Anyone Launch Own Phishing Campaigns

Published on

SIEM as a Service

With the release of the PhaaS platform called ‘Caffeine’, threat actors can now easily launch their own sophisticated phishing attacks. Anyone who wants to start their own phishing campaign will be able to register on this platform through an open registration process.

Caffeine has been thoroughly tested by the analysts at Mandiant. This is a free and open-source platform that does not require any specific requirements like the following to use its portal for launching Phishing campaigns:-

  • No invites or referrals required
  • No approval needed
  • No social shares required
  • No specific joining or subscription to any social channel or hacking forum is needed

Consequently, many of the obstacles that one faces when using platforms of this kind are eliminated from this platform, Caffeine, and this makes this platform unique and lucrative from others.

- Advertisement - SIEM as a Service

Sophisticated Phishing Campaigns

Furthermore, what makes Caffeine stand out in the crowd is that it has templates that are aimed at Russian and Chinese platforms. This is unusual for this platform since the vast majority of platforms mainly promote lures that are targeted at Western services.

Due to its low entry barrier and its feature-rich nature, security analysts at Mandiant found that it is a problematic PhaaS with too many features.

As a result of an investigation into a large-scale phishing campaign, Mandiant discovered Caffeine. While this campaign was aimed at stealing Microsoft 365 account credentials from one of their users.

Plans

According to the report, Caffeine has a collection of tools that are designed to help you create phishing campaigns of all kinds. There is a different tariff system available on the Caffeine website and they all are based on the features that are provided.

While here below we have mentioned the price list:-

  • For the “Basic” plan with 1-month validity will cost $250.
  • For the “Professional” plan with 3-month validity will cost $450.
  • For the “Enterprise” plan with 6-month validity will cost $850.

Rich features

Upon comparing the price chart to the average cost of a PhaaS subscription, it has been found that the price is about 3 to 5 times higher.

However, there are some services and advanced features that Caffeine has added to compensate for this shortcoming:-

  • Customer support services
  • Anti-discovery systems
  • Mechanisms for setting up dynamic pages
  • Anti-analysis systems
  • Pages with pre-populated information about the victim
  • Page redirection for the first stage and bait pages of the campaign
  • Different types of IP address blacklist options
  • Geoblocking options
  • CIDR range-based blocking

Additionally, operators also get the option of using the email management utility tool of the platform that is based on Python or PHP. The use of external tools is thus reduced since this eliminates the need for them.

Caffeine could pose a big problem since novice cybercriminals can easily launch sophisticated phishing campaigns by utilizing this platform.

Get Your Copy of Free DDoS Protection Whitepaper to learn types of DDoS Attacks

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker...

Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution

A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could...

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit...

Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access

Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker...

Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution

A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could...

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit...