Article Details
Scrape Timestamp (UTC): 2023-11-11 16:10:33.708
Original Article Text
Click to Toggle View
Police takes down BulletProftLink large-scale phishing provider. The notorious BulletProftLink phishing-as-a-service (PhaaS) platform that provided more than 300 phishing templates has been seized, the Royal Malaysian Police announced. The operation started in 2015 but came to researchers' radar later and became more active since 2018 and had thousands of subscribers, some of them paying for access to batches of credential logs. PhaaS platforms provide cybercriminals with tools and resources to carry out phishing attacks through “ready-to-use” kits and templates, page hosting, customization options, credential harvesting, and reverse proxying tools. The BulletProftLink operation has been documented before. In 2020, a cybersecurity expert Gabor Szathmari detailed in a three-part series of open-source intelligence research [1, 2, 3] how he linked with high confidence the operator of the service to a Malaysian national living a life of luxury. A Microsoft report in September 2021 warned about the high volume of phishing attacks it could facilitate and the large number of templates available to buyers. The service also collected all credentials its subscribers (1,618 at the time) stole in phishing attacks. BulletProftLink busted Aided by the Australian Federal Police and the FBI the Malaysian police managed to dismantle the operation and take down multiple domains it used by the illegal shop. The police arrested eight individuals on November 6, one of them a self-taught man believed to be the leader of the operation. Authorities also seized cryptocurrency wallets holding about $213,000, servers, computers, jewelry, vehicles, and payment cards. With servers confiscated, law enforcement can examine them to identify users of the platform, some of them paying a $2,000/month subscription fee to access regular batches of credentials logs. Cybercrime intelligence company Intel471says that as of April 2023, BulletProftLink had 8,138 active subscribers with access to 327 phishing page templates. This is a 403% rise in customers since Microsoft’s report in 2021, reflecting the platform’s massive popularity in the cybercrime community. Intel 471 says that phishing resources BulletProftLink offered before it was taken down "included login pages for Microsoft Office, DHL, the South Korea-based online platform Naver and financial institutions including American Express, Bank of America, Consumer Credit Union and Royal Bank of Canada." Some of these phishing pages were hosted on legitimate cloud services like Google Cloud and Microsoft Azure to evade email security tools. BulletProftLink's inventory also also offered the Evilginx2 reverse-proxying tool that enables adversary-in-the-middle (AITM) phishing attacks, which can bypass multi-factor authentication protections. The operation was an important source of credentials for professional cybercriminals to gain initial access to corporate systems. With a foothold in the company network, attackers can start the reconnaissance stage and moving laterally to valuable hosts.
Daily Brief Summary
The Royal Malaysian Police, with international assistance, shut down BulletProftLink, a major phishing-as-a-service (PhaaS) platform.
BulletProftLink offered over 300 phishing templates and services like page hosting and credential harvesting since at least 2018.
At the time of its bust, the service had 8,138 active subscribers, marking a significant increase from the 1,618 reported in a 2021 Microsoft warning.
Law enforcement arrested eight individuals and seized assets including servers and cryptocurrency wallets valued around $213,000.
Examining the confiscated servers may lead to the identification of users who paid for stolen credential logs.
BulletProftLink hosted phishing content on legitimate cloud services to avoid detection and offered tools to bypass multi-factor authentication.
The takedown of BulletProftLink disrupts a key source of initial access for cybercriminals to infiltrate corporate networks.