{"id":42180,"date":"2022-10-04T08:00:00","date_gmt":"2022-10-04T06:00:00","guid":{"rendered":"https:\/\/www.pentestfactory.de\/?p=42180"},"modified":"2024-07-26T10:29:51","modified_gmt":"2024-07-26T08:29:51","slug":"attacked-via-sms-smishing-examined","status":"publish","type":"post","link":"https:\/\/www.pentestfactory.de\/en\/attacked-via-sms-smishing-examined\/","title":{"rendered":"Attacked via SMS? Smishing examined"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42180\" class=\"elementor elementor-42180 elementor-42145\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-7d9670d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"84583\" data-id=\"7d9670d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61b6fb7\" data-eae-slider=\"34361\" data-id=\"61b6fb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94ec6ab elementor-widget elementor-widget-text-editor\" data-id=\"94ec6ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Introduction<\/h3><p>Almost everyone is familiar with the issue of spam: you receive e-mails telling you about unbeatable discounts, millions in winnings for your wallet or a blocked bank account. Often these are already filtered by spam filters before delivery or are unmasked by the numerous spelling mistakes and a strange sender address.<\/p><p>However, during our daily work at Pentest Factory, we were able to uncover a much more effective method to trick us into clicking on a malicious link: After a quick call to our mobile device, we receive the following SMS:<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-42147\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/1-e1663244942666.jpg\" alt=\"\" width=\"500\" height=\"360\" title=\"\"><\/p><h3>Analysis<\/h3><p>We open the link in a locked down virtual machine:<\/p><h4><img decoding=\"async\" class=\"aligncenter wp-image-42151 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/3-1.png\" alt=\"\" width=\"840\" height=\"207\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/3-1.png 840w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/3-1-300x74.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/3-1-768x189.png 768w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/h4><p>After a simple 301 redirect we reach the following page:<\/p><p><img decoding=\"async\" class=\"aligncenter wp-image-42149 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2-1.png\" alt=\"\" width=\"1137\" height=\"686\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2-1.png 1137w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2-1-300x181.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2-1-1024x618.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2-1-768x463.png 768w\" sizes=\"(max-width: 1137px) 100vw, 1137px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2f72390 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"17909\" data-id=\"2f72390\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac5924b\" data-eae-slider=\"22138\" data-id=\"ac5924b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95214b2 elementor-widget elementor-widget-text-editor\" data-id=\"95214b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>However, there is nothing out of the ordinary to be found at first glance. Even after analyzing the source code of the page, there are no special peculiarities to be seen.<\/p><p>However, we remember that the SMS was sent to a mobile device. Maybe it is possible to trigger a different behavior with a mobile user agent. We change our user agent to an ordinary Android Firefox browser. And look! We are now redirected to another page:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42153 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/4-1.png\" alt=\"\" width=\"1205\" height=\"224\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/4-1.png 1205w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/4-1-300x56.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/4-1-1024x190.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/4-1-768x143.png 768w\" sizes=\"(max-width: 1205px) 100vw, 1205px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-52b88c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"62800\" data-id=\"52b88c7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5fece1\" data-eae-slider=\"52459\" data-id=\"f5fece1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a69b122 elementor-widget elementor-widget-text-editor\" data-id=\"a69b122\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If we analyze the code of the page, we can see that it consists of 95% JavaScript code:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42155 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/5-1.png\" alt=\"\" width=\"385\" height=\"870\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/5-1.png 385w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/5-1-133x300.png 133w\" sizes=\"(max-width: 385px) 100vw, 385px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-cb1b0cd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"91274\" data-id=\"cb1b0cd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d3d52d1\" data-eae-slider=\"29937\" data-id=\"d3d52d1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b89d25 elementor-widget elementor-widget-text-editor\" data-id=\"5b89d25\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In our analysis of the code, we note that a series of checks are run to enumerate the properties of the browser and the underlying device:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42157 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/6-1.png\" alt=\"\" width=\"821\" height=\"678\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/6-1.png 821w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/6-1-300x248.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/6-1-768x634.png 768w\" sizes=\"(max-width: 821px) 100vw, 821px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-ea8dbe8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"60866\" data-id=\"ea8dbe8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56be1f8\" data-eae-slider=\"81347\" data-id=\"56be1f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eabd88f elementor-widget elementor-widget-text-editor\" data-id=\"eabd88f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These checks are located in separate functions (A1 to A91). These are iterated in a for loop and all parameters are queried. Afterwards all parameters returned by the check functions are converted to a JSON string.<\/p><p>This JSON string is then AES CBC encrypted using the JavaScript library &#8220;CryptoJS&#8221;:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42159 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/7-1.png\" alt=\"\" width=\"1109\" height=\"345\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/7-1.png 1109w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/7-1-300x93.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/7-1-1024x319.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/7-1-768x239.png 768w\" sizes=\"(max-width: 1109px) 100vw, 1109px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-39ad937 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"28069\" data-id=\"39ad937\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43257e1\" data-eae-slider=\"14702\" data-id=\"43257e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49ecb75 elementor-widget elementor-widget-text-editor\" data-id=\"49ecb75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The individual function calls and their names are obfuscated to make it difficult for a reader to understand the code:<\/p><p>An encoding function like 0x4ee32b takes an array position and a key as parameters. The section of JavaScript code we have called &#8220;encoded JavaScript&#8221; is a large array containing encoded function names (a so-called lookup table). If the function 0x4ee32b(index, key) is called, the value is read in the array at the corresponding index and this is decoded by means of the key parameter. This results in a final function name. Example:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42161 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/8-1.png\" alt=\"\" width=\"599\" height=\"47\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/8-1.png 599w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/8-1-300x24.png 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a3ca101 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"48617\" data-id=\"a3ca101\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b74530\" data-eae-slider=\"35341\" data-id=\"8b74530\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38eccf4 elementor-widget elementor-widget-text-editor\" data-id=\"38eccf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This way CryptoJS[&#8216;enc&#8217;][&#8216;Utf8&#8217;][&#8216;parse&#8217;] is called. A different way of writing CryptoJS.enc.Utf8.parse(string)<\/p><p> <\/p><p>We stopped our debugger at the point where the array parameter is passed to the encryption routine:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42163 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/9-1.png\" alt=\"\" width=\"1601\" height=\"481\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/9-1.png 1601w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/9-1-300x90.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/9-1-1024x308.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/9-1-768x231.png 768w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/9-1-1536x461.png 1536w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" \/><\/p><p>You can see that, among other things, it reads out which user agent we use, CPU, operating system, device manufacturer, browser, as well as many other parameters, which functions are allowed or possible on our device.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-50b0f71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"83026\" data-id=\"50b0f71\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-615ec63\" data-eae-slider=\"43509\" data-id=\"615ec63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01cc2ea elementor-widget elementor-widget-text-editor\" data-id=\"01cc2ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Then, an encryption of these values takes place and, the page transmits this encrypted string to another page:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42165 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/10-1.png\" alt=\"\" width=\"1707\" height=\"882\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/10-1.png 1707w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/10-1-300x155.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/10-1-1024x529.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/10-1-768x397.png 768w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/10-1-1536x794.png 1536w\" sizes=\"(max-width: 1707px) 100vw, 1707px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-67d82a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"4853\" data-id=\"67d82a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-603873e\" data-eae-slider=\"9731\" data-id=\"603873e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d204bc elementor-widget elementor-widget-text-editor\" data-id=\"5d204bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Once we arrive there, the server constructs a new redirect pointing to another host:<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42167 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/11-1.png\" alt=\"\" width=\"1235\" height=\"347\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/11-1.png 1235w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/11-1-300x84.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/11-1-1024x288.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/11-1-768x216.png 768w\" sizes=\"(max-width: 1235px) 100vw, 1235px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-179a31b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"60764\" data-id=\"179a31b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1945871\" data-eae-slider=\"72761\" data-id=\"1945871\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f4d164 elementor-widget elementor-widget-text-editor\" data-id=\"5f4d164\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This next host receives an encrypted URL that is passed as a GET parameter, which is then redirected to in the final step.<\/p><p>In our case, we are redirected to the &#8220;TikTok&#8221; app in the Google PlayStore:<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42169 size-full\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/12.png\" alt=\"\" width=\"1234\" height=\"484\" title=\"\" srcset=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/12.png 1234w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/12-300x118.png 300w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/12-1024x402.png 1024w, https:\/\/www.pentestfactory.de\/wp-content\/uploads\/12-768x301.png 768w\" sizes=\"(max-width: 1234px) 100vw, 1234px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a512a83 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"58702\" data-id=\"a512a83\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20ea924\" data-eae-slider=\"29064\" data-id=\"20ea924\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fab5977 elementor-widget elementor-widget-text-editor\" data-id=\"fab5977\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In an article from Google it is described (<a href=\"https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks\/<\/a>), how similar behavior was used in 2021 to infect Android devices with a 0-day vulnerability. Here, a link was sent to the victims via e-mail. After clicking on the link, an exploit was executed in the browser to gain control over the underlying device. Similar to our example, the page finally redirects to a legitimate website.<\/p><p>Since we did not have a vulnerable Android device available, we can only guess if the site we analyzed also had a 0-day vulnerability or an attack planned against our device. However, we can assume that the detailed and obfuscated testing of all system parameters of our device is a preparatory step to analyze the compatibility of an attack with our device in advance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3d4e1ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"13415\" data-id=\"3d4e1ef\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b80bd5b\" data-eae-slider=\"28111\" data-id=\"b80bd5b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-838c5bd elementor-widget elementor-widget-text-editor\" data-id=\"838c5bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Conclusion<\/h3><p>Be vigilant against phishing attacks &#8211; not only emails but also SMS messages can reference malicious sites and prompt you to install malware (disguised as a useful app) on your device. As can also be seen in Google&#8217;s article, just one click (to find out what is behind the link) can be enough to launch an attack on the device and take it over completely.<\/p><p>In general, we recommend the following measures to protect against such attacks:<\/p><ul style=\"direction: ltr;margin-top: 0in;margin-bottom: 0in\" type=\"disc\"><li style=\"margin-top: 0;margin-bottom: 0;vertical-align: middle\">Keep all your devices up to date. Install security updates on a regular (automated) basis. This includes mobile devices. Use a mobile device management system to verify that all devices in your organization are compliant with patch levels and security policies.<br><br><\/li><li style=\"margin-top: 0;margin-bottom: 0;vertical-align: middle\">Do not click on any links that cannot be trusted. This is especially true for messages from unknown senders. If in doubt, the message should first be forwarded to your security team for review.<br><br><\/li><\/ul><p><strong>Note:<\/strong> These recommendations are not an exhaustive list. If you are unsure whether you and your company are adequately protected against phishing, please contact us &#8211; we have many years of experience in protecting against phishing attacks and offer various services on a technical and personnel level. This includes:<\/p><ul><li>Technical examination of your mail servers regarding the resilience and detection capability of phishing mails as well as malware, incl. a final report with hardening measures and insight into which attacks were successful.<br><br><\/li><li style=\"margin-top: 0;margin-bottom: 0;vertical-align: middle\">Simulation of a real phishing attack to investigate how easily your employees become victims (anonymized evaluation also possible). Our attacks can be carried out by e-mail, telephone or physically (e.g. infected storage media).<br><br><\/li><li style=\"margin-top: 0;margin-bottom: 0;vertical-align: middle\">Educate your employees in phishing seminars to improve awareness of attacks<br><br><\/li><li style=\"margin-top: 0;margin-bottom: 0;vertical-align: middle\">Periodic repetition of simulated attacks to obtain progressive values of your anti-phishing measures and to examine the effectiveness of the measures<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Introduction Almost everyone is familiar with the issue of spam: you receive e-mails telling you about unbeatable discounts, millions in winnings for your wallet or a blocked bank account. Often these are already filtered by spam filters before delivery or are unmasked by the numerous spelling mistakes and a strange sender address. However, during our [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":42244,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-42180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-specialist-article"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/posts\/42180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/comments?post=42180"}],"version-history":[{"count":1,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/posts\/42180\/revisions"}],"predecessor-version":[{"id":42181,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/posts\/42180\/revisions\/42181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/media\/42244"}],"wp:attachment":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/media?parent=42180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/categories?post=42180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/tags?post=42180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}