Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

More phishing campaigns are using IPFS network protocol

Researcher by Researcher
April 9, 2023
in Cybersecurity
0
More phishing campaigns are using IPFS network protocol
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Learn how IPFS is used in phishing attacks and why it’s especially tricky to remove the impacted pages, as well as how to protect from this security threat.

Phishing Email Scam.
Image: Adobe Stock

The fraudulent use of the InterPlanetary File System seems to have increased recently, as reported in new research from Kaspersky. IPFS has been used by cybercriminals for email phishing attacks since 2022.

Jump to:

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

What is IPFS?

IPFS is a peer-to-peer network protocol designed to provide a decentralized and distributed web. Unlike traditional web protocols that rely on centralized servers, IPFS allows users to share and access files without depending on any central authority.

Must-read security coverage

IPFS identifies files by their content rather than their location. Each file is given a unique cryptographic hash called CID; the content identifier can be used to retrieve the file from any node on the network that stores a copy. This makes it easy to distribute and access content, even if the original source is offline or unavailable.

IPFS also uses a content-addressed system, which means any changes made to a file will result in a new hash. This ensures files remain immutable and tamper-proof.

Accessing IPFS can be done via a dedicated application programming interface or gateways, which provide access to IPFS content and is usable for any web browser.

The URL to access the gateway contains the CID and the gateway but may vary from one gateway to another. For example, it could be:

  • https://gateway/ipfs/CID
  • https://CID.ipfs.gateway

How IPFS is used in phishing attacks

In a usual phishing case, the target is enticed to visit a fraudulent phishing page that will steal their credentials and possibly their credit card information; however, this fraudulent page can be hosted on IPFS and accessed via a gateway.

The use of such a system allows attackers to reduce the costs of hosting the phishing page and makes it harder to remove the fraudulent content from the internet because it might reside on several computers at the same time.

In case a user has clicked on a phishing link and provided their credentials, it is important that the user changes their password as soon as possible and checks to see if there has been any malicious activity using that account.

Targeted phishing attacks also use IPFS

Most IPFS phishing attacks are not too original when compared with usual phishing, yet in some cases, IPFS is used for complex targeted attacks, according to Kaspersky (Figure A).

Figure A

Sample targeted attack phishing email with IPFS link.
Sample targeted attack phishing email with IPFS link. Image: Kaspersky

As can be seen in Figure A and described by Kaspersky, “the attacks were leveled at corporate procurement departments, the letters coming from sales managers of existing organizations.”

Phishing page removal is trickier for IPFS content

Usual phishing pages can be taken down by asking the web content provider or owner to remove them. That operation can take quite a bit of time depending on the host, especially when it is stored on bulletproof providers, which are illicit hosting providers who tell their customers they do not reply to law enforcement requests and do not take down content.

Takedown operations on IPFS content are different in the way the content needs to be removed from all nodes.

IPFS gateways’ providers attempt to combat those fraudulent pages by regularly deleting links to those files, yet it does not always happen as quickly as the blocking of a phishing website. Kaspersky’s researcher Roman Dedenok wrote on March 27, 2023, that Kaspersky has “observed URL addresses of IPFS files that first appeared in October 2022 and remain operational at the time of this writing.”

IPFS phishing statistics

As of late 2022, there were 2,000–15,000 IPFS phishing emails a day. In 2023, IPFS phishing began to increase in Kaspersky’s volumetry, with up to 24,000 emails a day in January and February; however, after that increase, the numbers came back to almost the same values as in December 2022 (Figure B).

Figure B

Number of IPFS phishing emails from late 2022 to the end of February 2023.
Number of IPFS phishing emails from late 2022 to the end of February 2023. Image: Kaspersky

Monthly statistics show a busy month in February with close to 400,000 phishing emails, while November and December were approximately between 228,000 and 283,000, respectively (Figure C).

Figure C

IPFS phishing emails per month from November 2022 to February 2023.
IPFS phishing emails per month from November 2022 to February 2023. Image: Kaspersky

How to protect from this IPFS phishing threat

Anti-spam solutions such as Microsoft Exchange Online Protection or Barracuda Email Security Gateway will help detect IPFS phishing and block links to it, just like for any usual phishing case.

Users should be educated about phishing emails or any kind of phishing link that could be sent to them via different ways including instant messaging and social networks.

Implement multifactor authentication to protect against unauthorized access. This will make it more difficult for attackers to gain access even if they have obtained login credentials through phishing.

Disclosure: I work for Trend Micro, but the views expressed in this article are mine.



Source link

Tags: CampaignsIPFSNetworkphishingProtocol
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
0

Threat actors are exploiting a critical-severity Zyxel flaw in order to add vulnerable devices to a Mirai botnet variant. While...

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
0

Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...

8 best practices for securing your Mac from hackers in 2023

8 best practices for securing your Mac from hackers in 2023

June 1, 2023
0

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and...

ZuoRAT Malware Found Hitting Home Routers

New SeroXen RAT Emerges | Decipher

June 1, 2023
0

Security researchers are tracking a new fileless RAT named SeroXen that has the capability to evade many EDR systems and...

Sentra Raises $30 Million for DSPM Technology

Chrome 114 Released With 18 Security Fixes

May 31, 2023
0

Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved