Evento di Lancio: Smart AI Security. Controllo Totale dei Dati. Prenota il tuo posto

chiudere
chiudere
La tua rete di domani
La tua rete di domani
Pianifica il tuo percorso verso una rete più veloce, sicura e resiliente, progettata per le applicazioni e gli utenti che supporti.
Experience Netskope
Prova direttamente la piattaforma Netskope
Ecco la tua occasione per sperimentare in prima persona la piattaforma single-cloud di Netskope One. Iscriviti a laboratori pratici e a ritmo autonomo, unisciti a noi per dimostrazioni mensili di prodotti dal vivo, fai un test drive gratuito di Netskope Private Access o partecipa a workshop dal vivo guidati da istruttori.
Un leader in SSE. Ora è un leader nel settore SASE a singolo fornitore.
Netskope è riconosciuto come Leader Più Lontano in Visione sia per le piattaforme SSE che SASE
2 volte leader nel Quadrante Magico di Gartner® per piattaforme SASE
Una piattaforma unificata costruita per il tuo percorso
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Scopri come la tua organizzazione può bilanciare il potenziale innovativo dell'AI generativa con pratiche solide di sicurezza dei dati.
eBook sulla Modern Data Loss Prevention (DLP) for Dummies
Modern Data Loss Prevention (DLP) for Dummies
Ricevi consigli e trucchi per passare a un DLP fornito dal cloud.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Smettila di inseguire la tua architettura di rete
Comprendere dove risiede il rischio
Advanced Analytics trasforma il modo in cui i team di operazioni di sicurezza applicano insight basati sui dati per implementare policy migliori. Con l'Advanced Analytics, puoi identificare tendenze, concentrarti sulle aree di interesse e utilizzare i dati per agire.
Supporto tecnico Netskope
Supporto tecnico Netskope
I nostri ingegneri di supporto qualificati sono dislocati in tutto il mondo e possiedono competenze diversificate in sicurezza cloud, networking, virtualizzazione, content delivery e sviluppo software, garantendo un'assistenza tecnica tempestiva e di qualità.
Video Netskope
Formazione Netskope
La formazione Netskope ti aiuterà a diventare un esperto di sicurezza cloud. Siamo qui per aiutarti a proteggere il tuo percorso di trasformazione digitale e a sfruttare al meglio le tue applicazioni cloud, web e private.

Attackers Target Crypto Wallets Using Codeless Webflow Phishing Pages

Oct 23 2024

Summary

From April to September 2024, Netskope Threat Labs tracked a 10-fold increase in traffic to phishing pages crafted through Webflow. The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for multiple company webmail platforms, as well as Microsoft365 login credentials. The campaigns have targeted more than 120 organizations worldwide, with the majority located in North America and Asia, across multiple segments led by financial services, banking, and technology. 

Attackers abuse Webflow in two ways: Creating standalone phishing pages and using Webflow pages to redirect victims to phishing pages hosted elsewhere. The former provides attackers stealth and ease because there are no phishing lines of code to write and detect, while the latter gives flexibility to the attacker to perform more complex actions as required. Webflow also provides custom publicly accessible subdomains without additional cost. 

Let’s take a closer look at these phishing and crypto scam campaigns.

Webflow abused to design phishing pages

Webflow is a visual website builder that allows a user to design websites through an intuitive drag-and-drop interface. Webflow comes with free tier access that provides a publicly accessible subdomain. While other apps, like Cloudflare R2 or Microsoft Sway, provide random alphanumeric subdomains, Webflow allows custom subdomains, which can be useful to trick victims.

Over the past seven months, we have seen a 10-fold increase in traffic to Webflow phishing pages. The phishing pages target crypto wallet information and login credentials. Some phishing pages use screenshots of the legitimate login pages to appear legitimate and either use Webflow’s link or form blocks to collect victim credentials. As of this writing, the Webflow phishing pages were reported and have been taken down.

Crafting phishing pages with Webflow

One of the challenges in creating phishing websites is ensuring they look identical to the legitimate page. The Webflow phishing and crypto scam campaigns solved this by taking a full-page screenshot of the legitimate app’s homepage and using it as its own homepage. Some phishing pages simply redirect you from this image to the actual phishing page hosted elsewhere. 

In other pages, attackers place link blocks on buttons that they entice their victims to click.

Building a phishing site without writing a line of code

Some of the phishing websites we investigated were more creative. They combined imagery from their target with Webflow’s form blocks. The form blocks allow the attacker to collect victims’ credentials directly in Webflow. By relying solely on Webflow, attackers can create phishing pages without writing any code at all.

Sample phishing page with an obscured company logo

To better understand and defend against these phishing scams, we replicated a phishing website using a Webflow free account. The phishing page we investigated consisted of two elements: a company logo image and a form block where the victim will enter their credentials. Without any prior knowledge of Webflow, we were able to create a phishing website within five minutes.

Phishing page creation using Webflow with an obscured company logo
Form data collected by Webflow

If the situation requires, Webflow also provides the means to redirect stolen credentials to a separate attacker-controlled website. Webform will forward the filled up form on the URL added on the submit button action field.

Crypto wallet phishing

Similar to credential phishing, we also identified Webflow crypto scam websites using a screenshot of a legitimate wallet homepage and used that image as its own phishing page. However unlike the phishing sites which used a button, the link blocks are set on the entirety of the image. This means whenever the victim clicks anywhere on the page, they will be redirected to the scam site.

Webflow crypto-phishing website

The majority of Webflow crypto-phishing websites we investigated only targeted the victim’s secret recovery phrase. Even though the scam website contained multiple options for signing in, all buttons led to attackers requesting the recovery phrase. Recovery phrases act like a master key to an account. They allow users to recover their account if they forget their passwords or lose their mobile phones. Attackers can use this recovery phrase to take over and drain an account.

The attacker collects the secret recovery phrase and then redirects the victim to an error message. The error messages found are identical to previous crypto wallet scams investigated by Netskope Threat Labs.

Crypto-phishing collecting secret recovery phrase
Error message upon submitting requested information

After collecting the secret recovery phase and showing an error message, an “Ask Expert” option appears where a chat from a “tech support” will assist you on this supposed issue. Even though we were unable to contact chat support, the chat app “tawk.to” was previously reported to be used in such scams.

Chat support upon failing to login on scam website

Recommendations

The scams and phishing pages described in the post are easily recognizable by the domain pattern *.webflow.io.  Users can avoid becoming victims of the attacks described in this post by checking the URL. Users should always access important pages, such as their banking portal or webmail, by typing the URL directly into the web browser instead of using search engines or clicking any other links.

Netskope Threat Labs recommends that organizations review their security policies to ensure that they are adequately protected against these and similar phishing pages and scams:

  • Inspect all HTTP and HTTPS traffic, including all web and cloud traffic, to prevent users from visiting malicious websites. Netskope customers can configure their Netskope NG-SWG with a URL filtering policy to block known phishing and scam sites, and a threat protection policy to inspect all web content to identify unknown phishing and scam sites using a combination of signatures, threat intelligence, and machine learning.
  • Use Remote Browser Isolation (RBI) technology to provide additional protection when there is a need to visit websites that fall in categories that can present higher risk, like Newly Observed and Newly Registered Domains.

IOCs

All the IOCs related to this campaign can be found in our GitHub repository.

author image
Jan Michael Alcantara
Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
Connettiti con Netskope

Iscriviti al blog di Netskope

Iscriviti per ricevere ogni mese una panoramica degli ultimi contenuti di Netskope direttamente nella tua casella di posta.