Data URI Schema : Phishing Attacks targeting GMail Users

www.escanav.com

Recently, there has been a wave of Phishing Scam targeting Google users. The Spam delivers either a pdf file or a word document which contains a link and in some cases just the plain simple email containing the link. It is also to be noted that some of the best researchers have been fooled by the method.

The link is actually an html body embedded in an URI ie. data:text/html also known as Data URI Schema and is supported by all modern day browsers.

One can even convert their browser into an instant notepad and all you need to do is to Copy Paste the code into the Browser URL Bar and hit Enter.

data:text/html, <html contenteditable>

or Display a RED Dot

data:text/html,<img src=”data:image/png;base64,iVBORw0KGgoAAAANSUhEUg
AAAAUAAAAFCAYAAACNbyblAAAAHElEQVQI12P4//8/w38GIAXDIBKE0DHxglj
NBAAO9TXL0Y4OHwAAAABJRU5ErkJggg==” alt=”Red dot” />

This isn’t a new method, however, what is new is that spammers are now actively targeting GMail users.

The code presented over here has been sanitized, as we closely observe the Data URI , it contains a script which has been encoded using Base-64 .

Sanitized Code:

Sanitized Code

Sanitized Code

After we decode the string, we come across a Packer Function, these functions are generally used to obfuscate the underlying code, however, from reversing point of view, it is important to know that, for any packer, in most of the cases, it is imperative that it should use “eval” , an inbuilt JavaScript function to evaluate / execute JavaScript code / expressions.

Over here the eval function is clearly visible, however there are numerous other packers which would try to hide eval either by splitting or by various other means – over here, we replace eval with alert which when executed would give us the unpacked code in an alert.

Sabitized Code with Packer Function

Sabitized Code with Packer Function

We repack the code using Base64

Re-Packed JavaScript Code

Re-Packed JavaScript Code

When we copy-paste the Data-URI into the browser URL bar we are able to view the pre-packed code. From this code it is quite evident that an iframe has been used to display the phishing page, which is retrieved from http://_rosettatranslation.top however, this wont happen in this case since

  1. The domain _rosettatranslation.top cannot exist, as it begins with an underscore.

Unpacking Packed JavaScript

Unpacking Packed JavaScript

Packers have been used extensively by Drive-by Downloads, DGA (Domain Generation Algorithm), Exploit Kits etc. in order to serve malicious pages. Sometimes it is easy to extract the code in an harmless manner and sometimes it takes a lot of ingenuity to extract / reverse.

According to Google it is the prerogative of the end user to ensure the sanity / validity of the contents of the URL Bar , however google users always have the option of implementing Two Factor Authentication , as rightly suggested by Google.

However, when the targeted site doesn’t use TFA, or is a Corporate Login Page , a spear phishing campaign has been initiated, the user has to be real attentive.

In past many years, there have been various methods to deliver the spam and entice the user to visit the malicious pages, although what hasn’t changed is the phishing page, due to which, whenever such attempts are made against a computer system protected by eScan’s eScan Smart Web-Filter, they get Detected and Blocked.

Since, the present campaign is targeting Gmail users , here are some tips to keep you safe:

  1. Stay Alert, be aware of the contents of the Browser’s URL Bar, ensure that the URL always begins with HTTP/HTTPS and if it begins with data then be extra careful.
  2. Browser shows distinct color coded warnings while visiting HTTP/HTTPS sites
  3. Use / Implement Two Factor Authentication whenever and wherever possible.

Readers may choose to read more about SURL / SMART Phishing Filter over here.

RBI Phishing

Statistical URL Analyzer

MalwareMustDie – BH EK version 2

SURL Analyzer – to Believe or not

CitiBank – A Phishing attempt

Statistical URL Analyzer – with MetaSploit

Statistical URL Analyzer – with MetaSploit and SET

eScan-14: Dynamic Phishing FiltereScan – 14: Filtro de Phishing Dinámico

 

This entry was posted in eScan 11, eScan 14, MailScan, Security and tagged , , , , , , , . Bookmark the permalink.

3 Responses to Data URI Schema : Phishing Attacks targeting GMail Users

  1. Otim charles alfred says:

    Prosphers@gmail.com
    Its really goog and easy to use.thanks alots.

    Like or Dislike: Thumb up 0 Thumb down 0

  2. Otim charles alfred says:

    Its very nice and good .
    Easy to use

    Like or Dislike: Thumb up 0 Thumb down 0

    • Jeba kumar says:

      Thank you, Otim Charles for your review.

      Like or Dislike: Thumb up 0 Thumb down 0

Comments are closed.