It’s a growing trend among attackers to offer their products as a service, just as regular companies do. In September, Microsoft researchers found that the BulletProofLink phishing-as-a-service (PhaaS) enterprise was taking this to the next level. It comes with over 100 phishing templates disguised as trusted brands and services. Take a look at how it works and what it says about attackers’ methods today.

Inside the Workings of BulletProofLink

Microsoft found BulletProofLink has been running since at least 2018.

That length of time gave its handlers time to create sites under aliases, like BulletProftLink and Anthrax, for advertising their services. Those sites included video ads hosted on YouTube and Vimeo. They also included an online store where ‘customers’ could register, snag a 10% welcome discount and sign in to their accounts going forward.

Microsoft found that the BulletProofLink monthly service cost users about $800 at the time of research. Other services such as one-time hosting links went for less, at $50.

BulletProofLink gave users a choice of over 100 templates that they could use to pretend to be legitimate companies. After buying one of those templates, the users would then have to send out the phishing emails themselves. They would also have to either register their own landing pages or use the gang’s hosted links for password collection.

In one phishing campaign, the attackers used BulletProofLink to fake Microsoft sites and try to steal users’ credentials. The campaign used a technique known as infinite subdomain abuse. This created a unique URL for each potential victim by breaking into a site’s Domain Name System.

In total, Microsoft observed the campaign using 300,000 subdomains. This makes mitigation and detection methods that rely only on domain and URL matching more complex.

How PhaaS Differs from Phishing Kits

PhaaS gangs like BulletProofLink aren’t the same as phishing kits. The former functions like Ransomware-as-a-Service (RaaS) gangs in that an attacker pays an operator for access to infrastructure and services that they can use to conduct their own attacks. By contrast, the latter consists of phishing packages that users buy with a one-time sale.

Plenty of phishing kits have popped up in recent years. In April 2020, for instance, the number of phishing kit ads on dark web forums had doubled in 2019 over the previous year. This explains why the price of a phishing kit grew by 149% in that span of time, reaching above $300 per item.

A few more kits have emerged since then. In January 2021, Threatpost reported that digital criminals were using a new phishing kit, called LogoKit, to automatically pull targeted company logos onto their phishing landing pages. Attackers used this to launch phishing attacks on 700 unique domains over a period of a month.

In October, many attackers used the XBALTI kit to redirect victims to a lookalike site pretending to be Chase Bank. In fact, the site was hosted on a compromised Brazilian website. The site then used multiple forms to steal several different pieces of information from its visitors.

How to Protect Against Phishing

Organizations can protect themselves against threats like BulletProofLink by putting technical controls in place. This includes using anti-phishing policies to enable mailbox intelligence settings as well as to enact impersonation protection settings. Complement these technical safeguards by fostering a culture of cyber awareness through ongoing cybersecurity training (and testing) that applies to all employees.

More from News

HHS Releases Hospital Cyber Resiliency Landscape Analysis

4 min read - On April 17, 2023, The U.S. Department of Health and Human Services (HHS) 405(d) Program announced the release of its Hospital Cyber Resiliency Initiative Landscape Analysis. This landmark analysis reports on domestic hospitals’ current state of cybersecurity preparedness. The scope of the HHS study was limited to activities that protect access to patient care and safety and reduce the negative impact of cyber threats on clinical operations. Breaches of sensitive data were considered only if the breach had a direct…

4 min read

Zombie APIs are a Top Security Concern as API Attacks Surge 400%

4 min read - Organizations of all sizes rely on application programming interfaces (APIs). The API explosion has been driven by several factors, including cloud computing, demand for mobile/web applications, microservices architecture and the API economy as a business model. APIs enable developers to access data remotely, integrate with other services, build modular applications and monetize their data/services. For enterprises that participated in a recent research study, the average number of APIs per organization was 15,564. Large enterprises (over 10,000 employees) had an average…

4 min read

Google’s Bug Bounty Hits $12 Million: What About the Risks?

4 min read - Bug bounty numbers have never been better. In 2022, Google rewarded the efforts of over 700 researchers from 68 different countries who helped improve the security of the company’s products and services. The total amount of awards grew from $8.7 million paid in 2021 to $12 million in 2022, a nearly 38% increase. Over the past few years, bug bounty programs have gained significant traction. Companies have been lured in by the potential to identify vulnerabilities quickly, enhance product security…

4 min read

Swiss Army Knife Malware Slices Through Systems In so Many Ways

4 min read - What if one single malware strain could cut through any security that tried to stop it? In a new study of more than 550,000 live malware strains, the Picus Red Report 2023 has unveiled a trove of over 5 million malicious activities. In the report, researchers identified the top tactics utilized by cyber criminals in 2022. Picus' findings also highlighted the growing prevalence of "Swiss Army knife malware". This type of malicious software is capable of executing a range of…

4 min read