November 10, 2021 By David Bisson 2 min read

It’s a growing trend among attackers to offer their products as a service, just as regular companies do. In September, Microsoft researchers found that the BulletProofLink phishing-as-a-service (PhaaS) enterprise was taking this to the next level. It comes with over 100 phishing templates disguised as trusted brands and services. Take a look at how it works and what it says about attackers’ methods today.

Inside the Workings of BulletProofLink

Microsoft found BulletProofLink has been running since at least 2018.

That length of time gave its handlers time to create sites under aliases, like BulletProftLink and Anthrax, for advertising their services. Those sites included video ads hosted on YouTube and Vimeo. They also included an online store where ‘customers’ could register, snag a 10% welcome discount and sign in to their accounts going forward.

Microsoft found that the BulletProofLink monthly service cost users about $800 at the time of research. Other services such as one-time hosting links went for less, at $50.

BulletProofLink gave users a choice of over 100 templates that they could use to pretend to be legitimate companies. After buying one of those templates, the users would then have to send out the phishing emails themselves. They would also have to either register their own landing pages or use the gang’s hosted links for password collection.

In one phishing campaign, the attackers used BulletProofLink to fake Microsoft sites and try to steal users’ credentials. The campaign used a technique known as infinite subdomain abuse. This created a unique URL for each potential victim by breaking into a site’s Domain Name System.

In total, Microsoft observed the campaign using 300,000 subdomains. This makes mitigation and detection methods that rely only on domain and URL matching more complex.

How PhaaS Differs from Phishing Kits

PhaaS gangs like BulletProofLink aren’t the same as phishing kits. The former functions like Ransomware-as-a-Service (RaaS) gangs in that an attacker pays an operator for access to infrastructure and services that they can use to conduct their own attacks. By contrast, the latter consists of phishing packages that users buy with a one-time sale.

Plenty of phishing kits have popped up in recent years. In April 2020, for instance, the number of phishing kit ads on dark web forums had doubled in 2019 over the previous year. This explains why the price of a phishing kit grew by 149% in that span of time, reaching above $300 per item.

A few more kits have emerged since then. In January 2021, Threatpost reported that digital criminals were using a new phishing kit, called LogoKit, to automatically pull targeted company logos onto their phishing landing pages. Attackers used this to launch phishing attacks on 700 unique domains over a period of a month.

In October, many attackers used the XBALTI kit to redirect victims to a lookalike site pretending to be Chase Bank. In fact, the site was hosted on a compromised Brazilian website. The site then used multiple forms to steal several different pieces of information from its visitors.

How to Protect Against Phishing

Organizations can protect themselves against threats like BulletProofLink by putting technical controls in place. This includes using anti-phishing policies to enable mailbox intelligence settings as well as to enact impersonation protection settings. Complement these technical safeguards by fostering a culture of cyber awareness through ongoing cybersecurity training (and testing) that applies to all employees.

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today