Cloud Security

Lookout discovers CryptoChameleon targeting FCC & crypto platforms

Threat Actor Emulates Scattered Spider Group and Takes Unique Approach to Collect Login Credentials

Lookout, Inc., the data-centric cloud security company, today announced the discovery of an advanced phishing kit, CryptoChameleon, which exhibits tactics that target cryptocurrency platforms as well as the Federal Communications Commission (FCC) via mobile devices. The intended targets, mostly users of cryptocurrency and single sign-on (SSO) services in the United States, also include Binance and Coinbase employees. Leveraging the CryptoChameleon phishing kit, bad actors utilize text messages and voice calls where they personally reach out to the victim to build a sense of trust while encouraging them to follow the steps of the attack. This has resulted in a high success rate, leading to the collection of quality data, including usernames, passwords, password reset URLs and even photo IDs. Lookout customers who have Phishing Content Protection (PCP) were protected against CryptoChameleon.

This new phishing kit emulates techniques that have been used by the Scattered Spider cybercriminal group. Operators behind the kit have successfully duplicated pages for solutions like Okta, Outlook and Google, which means it could be used to target any organization that uses these solutions as their SSO provider. Based on conversations that the Lookout security research team had with several victims, CryptoChameleon uses phone numbers and websites that appear legitimate and reflect a real company’s support team. While CryptoChameleon follows similar tactics, there are enough differences to indicate that this is likely not Scattered Spider operating the kit and could be a different criminal group or several individual actors.

This style of attack is one that Lookout has been observing and analyzing closely as it continues to increase in frequency and become more prevalent. With more corporate data residing in the cloud and a change in how users interact with that data, an increasing number of bad actors are now leveraging social engineering, targeting a user’s mobile phone to steal credentials that provide legitimate and immediate access to critical corporate data as part of the modern cyber kill chain. Lookout data shows that every quarter, between 23% and 26% of mobile users tapped on at least one phishing link in 2023. And the discovery of CryptoChameleon represents another significant shift in the continued evolution of this kill chain.

“We’re seeing a trend of financially motivated threat actors – who typically target cryptocurrency and direct financial fraud – move into breaching enterprise and government organizations for ransom,”said David Richardson, Vice President of Endpoint and Threat Intelligence, Lookout. “We urge cryptocurrency and single-sign-on users and organizations to take steps to protect their devices, work and personal data.”

CryptoChameleon highlights:

  • The phishing kit first asks the victim to complete a captcha using hCaptcha. This is a tactic that prevents automated analysis tools from crawling and identifying the phishing site.
  • Unlike typical phishing kits, which attempt to harvest credentials as quickly as possible, CryptoChameleon is aware of modern security controls organizations have put in place such as multi-factor authentication and allows bad actors to respond accordingly.
  • While the version of CryptoChameleon targeted at the FCC impersonates the FCC’s specific Okta page by default, the kit can impersonate many different companies’ brands and authentication processes.
  • Lookout also found Okta impersonation pages that target employees of Binance and Coinbase, but the majority of the sites seemed to target users of cryptocurrency and SSO services.
  • Based on the phishing site characteristics, Lookout researchers have identified over 250 phishing sites using this kit with more being found every day.
  • Since initially discovering the phishing kit, Lookout has seen evidence that hundreds of victims have been impacted by the attack.

Lookout Mobile Endpoint Security customers have been protected against these phishing sites since before the February 2024 discovery, based on insights from parallels and similar infrastructure of previous attacks. Lookout will continue to track the general behaviors and techniques used by this and other criminal groups to ensure protection against additional sites that use this kit and will continue to update protections for customers through automated means as necessary.

Visit AITechPark for cutting-edge Tech Trends around AI, ML, Cybersecurity, along with AITech News, and timely updates from industry professionals!

Related posts

Aqua Security announced the addition of key features to CNAPP

Business Wire

Point Fort Fichet announced partnership with Essence Security

PR Newswire

Broadcom Unveils the Future of VMware Cloud Foundation

GlobeNewswire