Long story short, We have a private WhatsApp/Telegram group which includes renowned infosec people & law enforcement officials from Tamil Nadu.
I received a notification that, there is a new ongoing attack where victim when visited to a malicious site are being redirected to cybercrime.gov.in in a new pop-up window & made to pay fine to cybercrime.gov.in as shown in picture below.
Note: At this point of time I had no direct contact with victim, nor have any other additional information.
Looking at the image, first thing we will notice that the url is— https://cybercrime.gov.in/en/k54845–6278.htm , The url literally looks like a real & non-phishing url. At first look, people in the group were assuming that cybercrime.gov.in website itself has been hacked & malicious webpage got hosted at Cyber Crime Portal to carry out phishing attack.
On visiting https://cybercrime.gov.in/en/k54845–6278.htm, 404 webpage is shown.
Searching web archive for the url also shows no evidences of cybercrime portal getting hacked — https://web.archive.org/web/20240000000000*/https://cybercrime.gov.in/en/k54845%E2%80%936278.htm
My Initial Assumptions of Attack Vector were —
- Browser-In-The-Browser (BITB) attack
- DNS Hijacking
- Victim Using Compromised WiFi Router, Proxy, VPN Services
- Hackers exploiting a unknown 0day involving url spoofing in Google Chrome browser
But let’s analyze the image closely & analyze the evidences —
Observations from Evidence Image —
- The box around Close, Minimize & Maximize icon in the browser appeared to be of irregular size & appears to be edited.
- The social media icons in the Webpage appears to slightly overlap with the browser’s omnibox, which shouldn’t normally happen in a browser, as html content of webpage can never overlap with browser’s renderer.
- We notice that “2023 INDIA” is written on the webpage & But current date on system is 28–07–2024.
- We notice that title bar shows — “National Crime Records Bureau” (NCRB) text & also has logo of NCRB, But the actual website is https://cybercrime.gov.in/, whose original title should be “Cyber Crime Portal”.
- The url from evidence is https://cybercrime.gov.in/en/k54845–6278.htm
- The text in the webpage obviously looks like a scam 🤣 — “The police will come to your home to arrest you and criminal charges will be filed against you”
- We also know that, Victim has been redirected to Cyber Crime portal from a malicious website by opening a pop-up window as mentioned earlier.
Based on my observations, I initially assumed that hackers were using a phishing page designed to mimic the appearance of the Cyber Crime Portal. The attack strategy employed in this case appears to be a Browser-In-The-Browser (BITB) attack.
How do we confirm our assumptions, we don’t have contact with victim nor we have information about initial malicious website visited by the victim.
I searched online using Google Dorks for texts obtained from the image evidence & found similar cases — case 1, case 2, case 3.
Case 2 appears very similar to our case & seems to be using a very similar webpage template as in our case.
Hence, we can assume from previous attack histories that this should be a phishing case of Cyber Crime Portal carried through Browser-In-The-Browser (BITB) attack.
But we still do not have source link of phishing site, How do we find such phishing sites to confirm our assumptions ?
From our observations — We already noted that — title bar shows “National Crime Records Bureau” (NCRB) text & also has logo of NCRB, But the actual website is https://cybercrime.gov.in/, whose original title should be “Cyber Crime Portal”.
Assuming the hackers has copied the design, template & logo of NCRB to create their phishing page due to laziness (🤣), We can search for favicon hash of NCRB logo in shodan/censys to obtain websites/hosts using the same logo of NCRB, filtering out the real one’s whose SSL certificate is from *.gov.in/*nic.in.
There are several ways to calculate favicon hash, easiest is to use https://favicon-hash.kmsec.uk/.
Searching the Censys & Shodan using obtained favicon hash for hosts having Non-Indian IP’s & filtering out SSL having .gov.in, .nic.in will give list of all malicious IP’s hosting the phishing pages at scale.
Sample Malicious IP’s used for phishing cybercrime.gov.in using BITB attack —
- https://2.57.149.44/
- https://2.57.149.251/
- https://2.57.149.113/
- https://2.57.149.98/
- http://193.187.175.127/
- https://45.152.84.47/
Finally, shared the list of malicious IP’s with required proofs for blocking those IP’s to Subash Jaganathan(@subash_0fficial), who is a Cyber Crime Investigator & has been assisting Cyber Crime Wing, Tamil Nadu in various cases.
Liked my article ? Follow me on LinkedIn, Twitter (@jayateerthaG), and Medium for more content about bugbounty, Infosec, cybersecurity and hacking.
Written on July 29, 2024 by Jayateertha Guruprasad.
Originally published on Medium