-
Notifications
You must be signed in to change notification settings - Fork 16
/
Copy path2024-11-05-Roblox-phishing-campaign.txt
50 lines (38 loc) · 1.4 KB
/
2024-11-05-Roblox-phishing-campaign.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
2024-11-05 (TUESDAY): ROBLOX PHISHING CAMPAIGN
AUTHORS:
- Peng Peng, Joey Allen
REFERENCES:
- https://www.linkedin.com/posts/unit42_phishing-activity-7260079529208000512-cUk0/
- https://x.com/Unit42_Intel/status/1854313903594848483
NOTES:
- We've identified at least 19 domains that have remain active in a phishing campaign targeting Roblox users.
- Some of these domains have been active for months or years.
- Most of these domains use various country code Top-Level Domain (TLD) names.
- These domains host phishing pages to steal Roblox account credentials.
- These pages incorporate captchas that mimic the login process to appear legitimate.
- The captchas only appear after valid Roblox login credentials are used on the phishing page.
DOMAINS FOR ROBLOX PHISHING WEBSITES:
- httpps-wvw-roblox[.]com
- https-vwww-roblox[.]com
- roblofx[.]com
- roblox[.]com[.]by
- roblox[.]com[.]hn
- roblox[.]com[.]kg
- roblox[.]com[.]kz
- roblox[.]com[.]ni
- roblox[.]com[.]sb
- roblox[.]com[.]zm
- roblox[.]et
- roblox[.]fo
- roblox[.]ge
- roblox[.]gr[.]com
- roblox[.]tg
- robloxi[.]com[.]kz
- robloxx[.]com[.]kz
- web-www-roblox[.]com
- wvyw-roblox[.]com
DOMAINS FOR SERVERS HOSTING JAVASCRIPT AND CAPTURING LOGIN CREDENTIALS:
- api.wakura[.]lu
- app.wakura[.]lu
EXAMPLE OF HTTP POST REQUEST THAT EXFILTRATES LOGIN CREDENTIALS:
- hxxps[:]//api.wakura[.]lu/v3/authentication