It’s a growing trend among attackers to offer their products as a service, just as regular companies do. In September, Microsoft researchers found that the BulletProofLink phishing-as-a-service (PhaaS) enterprise was taking this to the next level. It comes with over 100 phishing templates disguised as trusted brands and services. Take a look at how it works and what it says about attackers’ methods today.

Inside the Workings of BulletProofLink

Microsoft found BulletProofLink has been running since at least 2018.

That length of time gave its handlers time to create sites under aliases, like BulletProftLink and Anthrax, for advertising their services. Those sites included video ads hosted on YouTube and Vimeo. They also included an online store where ‘customers’ could register, snag a 10% welcome discount and sign in to their accounts going forward.

Microsoft found that the BulletProofLink monthly service cost users about $800 at the time of research. Other services such as one-time hosting links went for less, at $50.

BulletProofLink gave users a choice of over 100 templates that they could use to pretend to be legitimate companies. After buying one of those templates, the users would then have to send out the phishing emails themselves. They would also have to either register their own landing pages or use the gang’s hosted links for password collection.

In one phishing campaign, the attackers used BulletProofLink to fake Microsoft sites and try to steal users’ credentials. The campaign used a technique known as infinite subdomain abuse. This created a unique URL for each potential victim by breaking into a site’s Domain Name System.

In total, Microsoft observed the campaign using 300,000 subdomains. This makes mitigation and detection methods that rely only on domain and URL matching more complex.

How PhaaS Differs from Phishing Kits

PhaaS gangs like BulletProofLink aren’t the same as phishing kits. The former functions like Ransomware-as-a-Service (RaaS) gangs in that an attacker pays an operator for access to infrastructure and services that they can use to conduct their own attacks. By contrast, the latter consists of phishing packages that users buy with a one-time sale.

Plenty of phishing kits have popped up in recent years. In April 2020, for instance, the number of phishing kit ads on dark web forums had doubled in 2019 over the previous year. This explains why the price of a phishing kit grew by 149% in that span of time, reaching above $300 per item.

A few more kits have emerged since then. In January 2021, Threatpost reported that digital criminals were using a new phishing kit, called LogoKit, to automatically pull targeted company logos onto their phishing landing pages. Attackers used this to launch phishing attacks on 700 unique domains over a period of a month.

In October, many attackers used the XBALTI kit to redirect victims to a lookalike site pretending to be Chase Bank. In fact, the site was hosted on a compromised Brazilian website. The site then used multiple forms to steal several different pieces of information from its visitors.

How to Protect Against Phishing

Organizations can protect themselves against threats like BulletProofLink by putting technical controls in place. This includes using anti-phishing policies to enable mailbox intelligence settings as well as to enact impersonation protection settings. Complement these technical safeguards by fostering a culture of cyber awareness through ongoing cybersecurity training (and testing) that applies to all employees.

More from News

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…

Malware-as-a-Service Flaunts Its Tally of Users and Victims

As time passes, the security landscape keeps getting stranger and scarier. How long did the “not if, but when” mentality towards cyberattacks last — a few years, maybe? Now, security pros think in terms of how often will their organization be attacked and at what cost. Or they consider how the difference between legitimate Software-as-a-Service (SaaS) brands and Malware-as-a-Service (MaaS) gangs keeps getting blurrier. MaaS operators provide web-based services, slick UX, tiered subscriptions, newsletters and Telegram channels that keep users…

New Survey Shows Burnout May Lead to Attrition

For many organizations and the cybersecurity industry as a whole, improving retention and reducing the skills gap is a top priority. Mimecast’s The State of Ransomware Readiness 2022: Reducing the Personal and Business Cost points to another growing concern — burnout that leads to attrition. Without skilled employees, organizations cannot protect their data and infrastructure from increasing cybersecurity attacks. According to Mimecast’s report, 77% of cybersecurity leaders say the number of cyberattacks against their company has increased or stayed the…

Alleged FBI Database Breach Exposes Agents and InfraGard

Recently the feds suffered a big hack, not once, but twice. First, the FBI-run InfraGard program suffered a breach. InfraGard aims to strengthen partnerships with the private sector to share information about cyber and physical threats. That organization experienced a major breach in early December, according to a KrebsOnSecurity report. Allegedly, the InfraGard database — containing contact information of over 80,000 members — appeared up for sale on a cyber crime forum. Also, the hackers have reportedly been communicating with…