Skip to main content

Command Palette

Search for a command to run...

Beware: Fake Amazon PDF Phishing Campaign Targets Users

Updated
3 min read
Beware: Fake Amazon PDF Phishing Campaign Targets Users
T

Just a SOC Analyst ^^

Researchers at Palo Alto Networks Unit42 are observing a surge in a new phishing tactic: using malicious PDF documents to deceive victims with notifications about Amazon Prime membership renewal.

Phishing Method

Email is the method attackers use to reach victims. An email is attached with a PDF file, and after clicking on the file, victims are redirected from the original URL to subdomains of duckdns[.]org, which host fake Amazon websites where they are asked to enter personal and credit card information.

Security researchers have collected 31 PDF files containing links to these phishing websites, none of which have been submitted to VirusTotal.

"These phishing websites use cloaking techniques to redirect scanners and other security solutions to non-malicious domains." This technique uses multiple URLs, but they all point to the same IP address – meaning all those phishing pages are hosted on the same server. This allows attackers to easily manage the phishing campaign from a single server while creating multiple malicious links to avoid immediate detection.

There are four initial links used in the campaign that users need to be wary of:

  • hxxps[:]//redirjhmxnasmdhuewfmkxchbnvjxfasdfasd.duckdns[.]org/XOZLaMh

  • hxxps[:]//redixajcdkashdufzxcsfgfasd.duckdns[.]org/CCq8SKn

  • hxxps[:]//zmehiasdhg7uw.redirectme[.]net/xn28lGa

  • hxxps[:]//rediahxjasdusgasdzxcsdefwgasdgasdasdzxdz.duckdns[.]org/agungggg1298w862847

List of IOCs Related to the Campaign

Hashes of 31 PDF Files

ValueType
0d30813426132eb0e7058776f336be1ed788adb40429e1f14808c82cefb71cc0SHA256
0f6fb7fac3185c6993ab0a95021aa45b597a53face177233e110a94563e2d94bSHA256
11d5a4be70b5370f70a2f9539f6a6e23f4393bc047147eda18992754b62993c4SHA256
22fab6e48be2beb9cf4837a840be6e0345e7d9027c4da5168d6120bd725833c8SHA256
2f123f63b17c65ebdcf9bb517bd25b2a13c319979368404d2688a69a7367a4d4SHA256
32e802617c978e2afa1052c565efb060bdbfff633988066587acd2a228a1e964SHA256
35a0cf22be7fb938b18f85292a00a6a576916065555b63d4bcb224b8a2e7d812SHA256
3b824f2a7d27bf4ab264064c5716dcedf8cfb83aa8ec7ce1670c94b43508904cSHA256
42655606bf51695fc6b4d9afb597132626aa04497d256bd84aef406a8e8b061dSHA256
4b5670c72b54b6e2b45ab143ca0fd8d75a28663a8141135e717b528beb4ac97fSHA256
4edd8546455b3cfdfdc90b062c43da8ce253379dfe83ea8957234cad067966d7SHA256
4f90e88d593e9ba8e6e67e8e1cbb4c9cbb5c58f3e515d46835865414eaa8f0b3SHA256
53c9b76a227904618cdb97a33fbec3a503a444434418dd8d91372d800778e63dSHA256
5a64f6c88d894e172ab3ed07938eafcf01ccfafea31d272dc06b0ebdc658f94dSHA256
5d96918ca4adebbb3d594b36acf0f9198a952c50aa82047aafe854c957a82840SHA256
5e8a50781d4238a324cba432d081e881f1e2ea7b2a3ae5851373094cecf7b41bSHA256
62cd345de8457a373bbc13a79436238eedba1f43e871418def1769f0f2502d0cSHA256
64d1c6685ca0e2c8ca327e17cea16bbad3ae791cf03c6c2ea22d361f7b0d0338SHA256
76fb339b8014534f85f9fe64e3eec279fe26098b60d255ceaa0ee177587e8b9eSHA256
78fcaf119b365d4171011dfdfa4ea4d5acd6c9656cd882418462ff6567cca00fSHA256
858dc5420867b6824de8143456ff521461cec1330d7d48ff0ea07a02056f1a4aSHA256
8d4fd20207ee690561f5282a26b2374dff036a579527e8b1244fc6f1766c3bb2SHA256
9add5bcfbd46b52744b6c02e829d815d3fdcd0a9221852c7254d892c4f5f984fSHA256
a1e3214afad9332327283c956990ae0e8ddf8084c5dd5d5fde605462ebd7e45dSHA256
a5f468421c9b3d66ed67c7accfb13ae19d6b1cee4050bdb505feea0d85161e9aSHA256
beeefae8f969bb3b749a505afd53ad2bad2eb301eab28466cf4a0ed6d9da81bcSHA256
cd0b45c96062c804ff3903065d68348494db6375679e369916fdcf0b3d17f262SHA256
D00800e8fdfa6564bed0c5b0a76091a34753cf5c6d63c81441f8c8214afcb58eSHA256
e117c21bdcd5564b4a68b26d7148d2a073009b78485f42c4b5507723835663a0SHA256
eafc7707cdbd1936f5312491dd6c6f0726f1c04ca2dd44421ba79e9d010cee2aSHA256
fa5aaf381d82aafca3ecabbece1cc2ff37401ec104e694b73e87bf02a9ef071aSHA256
hxxps[:]//redirjhmxnasmdhuewfmkxchbnvjxfasdfasd.duckdns[.]org/XOZLaMh
hxxps[:]//redixajcdkashdufzxcsfgfasd.duckdns[.]org/CCq8SKn
hxxps[:]//zmehiasdhg7uw.redirectme[.]net/xn28lGa
hxxps[:]//rediahxjasdusgasdzxcsdefwgasdgasdasdzxdz.duckdns[.]org/agungggg1298w862847

Recommendations

FPT Threat Intelligence recommends organizations and individuals take several measures to prevent this campaign:

  • Educate and Raise User Awareness: Increase awareness of threats, especially phishing emails.

  • Carefully Check Sender Email Addresses: Ensure the sender's email address is from a trusted source.

  • Use Email Security Solutions: Deploy specialized email security services for comprehensive protection.

  • Do Not Click on Links in Unfamiliar Emails: Avoid clicking on links or downloading attachments from unknown emails.

References

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.