Netskopeは、2025年ガートナー、SASEプラットフォームのマジック・クアドラントで再びリーダーの1社として評価をいただきました。レポートを入手する

閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Netskopeプラットフォームを実際に体験する
          Netskope Oneのシングルクラウドプラットフォームを直接体験するチャンスです。自分のペースで進められるハンズオンラボにサインアップしたり、毎月のライブ製品デモに参加したり、Netskope Private Accessの無料試乗に参加したり、インストラクター主導のライブワークショップに参加したりできます。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope は、 SSE プラットフォームと SASE プラットフォームの両方で、ビジョンで最も優れたリーダーとして認められています
            2X ガートナーマジック クアドラント SASE プラットフォームのリーダー
            旅のために構築された 1 つの統合プラットフォーム
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              ジェネレーティブ AI の革新的な可能性と堅牢なデータ セキュリティ プラクティスのバランスを取る方法をご覧ください。
                ダミーのための最新のデータ損失防止(DLP)eBook
                最新の情報漏えい対策(DLP)for Dummies
                クラウド配信型 DLP に移行するためのヒントとコツをご紹介します。
                  SASEダミーのための最新のSD-WAN ブック
                  SASEダミーのための最新のSD-WAN
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics は、セキュリティ運用チームがデータ主導のインサイトを適用してより優れたポリシーを実装する方法を変革します。 Advanced Analyticsを使用すると、傾向を特定し、懸念事項に的を絞って、データを使用してアクションを実行できます。
                        Netskopeテクニカルサポート
                        Netskopeテクニカルサポート
                        クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                          Netskopeの動画
                          Netskopeトレーニング
                          Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                            Attackers Target Crypto Wallets Using Codeless Webflow Phishing Pages

                            Oct 23 2024

                            Summary

                            From April to September 2024, Netskope Threat Labs tracked a 10-fold increase in traffic to phishing pages crafted through Webflow. The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for multiple company webmail platforms, as well as Microsoft365 login credentials. The campaigns have targeted more than 120 organizations worldwide, with the majority located in North America and Asia, across multiple segments led by financial services, banking, and technology. 

                            Attackers abuse Webflow in two ways: Creating standalone phishing pages and using Webflow pages to redirect victims to phishing pages hosted elsewhere. The former provides attackers stealth and ease because there are no phishing lines of code to write and detect, while the latter gives flexibility to the attacker to perform more complex actions as required. Webflow also provides custom publicly accessible subdomains without additional cost. 

                            Let’s take a closer look at these phishing and crypto scam campaigns.

                            Webflow abused to design phishing pages

                            Webflow is a visual website builder that allows a user to design websites through an intuitive drag-and-drop interface. Webflow comes with free tier access that provides a publicly accessible subdomain. While other apps, like Cloudflare R2 or Microsoft Sway, provide random alphanumeric subdomains, Webflow allows custom subdomains, which can be useful to trick victims.

                            Over the past seven months, we have seen a 10-fold increase in traffic to Webflow phishing pages. The phishing pages target crypto wallet information and login credentials. Some phishing pages use screenshots of the legitimate login pages to appear legitimate and either use Webflow’s link or form blocks to collect victim credentials. As of this writing, the Webflow phishing pages were reported and have been taken down.

                            Crafting phishing pages with Webflow

                            One of the challenges in creating phishing websites is ensuring they look identical to the legitimate page. The Webflow phishing and crypto scam campaigns solved this by taking a full-page screenshot of the legitimate app’s homepage and using it as its own homepage. Some phishing pages simply redirect you from this image to the actual phishing page hosted elsewhere. 

                            In other pages, attackers place link blocks on buttons that they entice their victims to click.

                            Building a phishing site without writing a line of code

                            Some of the phishing websites we investigated were more creative. They combined imagery from their target with Webflow’s form blocks. The form blocks allow the attacker to collect victims’ credentials directly in Webflow. By relying solely on Webflow, attackers can create phishing pages without writing any code at all.

                            Sample phishing page with an obscured company logo

                            To better understand and defend against these phishing scams, we replicated a phishing website using a Webflow free account. The phishing page we investigated consisted of two elements: a company logo image and a form block where the victim will enter their credentials. Without any prior knowledge of Webflow, we were able to create a phishing website within five minutes.

                            Phishing page creation using Webflow with an obscured company logo
                            Form data collected by Webflow

                            If the situation requires, Webflow also provides the means to redirect stolen credentials to a separate attacker-controlled website. Webform will forward the filled up form on the URL added on the submit button action field.

                            Crypto wallet phishing

                            Similar to credential phishing, we also identified Webflow crypto scam websites using a screenshot of a legitimate wallet homepage and used that image as its own phishing page. However unlike the phishing sites which used a button, the link blocks are set on the entirety of the image. This means whenever the victim clicks anywhere on the page, they will be redirected to the scam site.

                            Webflow crypto-phishing website

                            The majority of Webflow crypto-phishing websites we investigated only targeted the victim’s secret recovery phrase. Even though the scam website contained multiple options for signing in, all buttons led to attackers requesting the recovery phrase. Recovery phrases act like a master key to an account. They allow users to recover their account if they forget their passwords or lose their mobile phones. Attackers can use this recovery phrase to take over and drain an account.

                            The attacker collects the secret recovery phrase and then redirects the victim to an error message. The error messages found are identical to previous crypto wallet scams investigated by Netskope Threat Labs.

                            Crypto-phishing collecting secret recovery phrase
                            Error message upon submitting requested information

                            After collecting the secret recovery phase and showing an error message, an “Ask Expert” option appears where a chat from a “tech support” will assist you on this supposed issue. Even though we were unable to contact chat support, the chat app “tawk.to” was previously reported to be used in such scams.

                            Chat support upon failing to login on scam website

                            Recommendations

                            The scams and phishing pages described in the post are easily recognizable by the domain pattern *.webflow.io.  Users can avoid becoming victims of the attacks described in this post by checking the URL. Users should always access important pages, such as their banking portal or webmail, by typing the URL directly into the web browser instead of using search engines or clicking any other links.

                            Netskope Threat Labs recommends that organizations review their security policies to ensure that they are adequately protected against these and similar phishing pages and scams:

                            • Inspect all HTTP and HTTPS traffic, including all web and cloud traffic, to prevent users from visiting malicious websites. Netskope customers can configure their Netskope NG-SWG with a URL filtering policy to block known phishing and scam sites, and a threat protection policy to inspect all web content to identify unknown phishing and scam sites using a combination of signatures, threat intelligence, and machine learning.
                            • Use Remote Browser Isolation (RBI) technology to provide additional protection when there is a need to visit websites that fall in categories that can present higher risk, like Newly Observed and Newly Registered Domains.

                            IOCs

                            All the IOCs related to this campaign can be found in our GitHub repository.

                            author image
                            Jan Michael Alcantara
                            Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
                            Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
                            Netskopeとつながる

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.