{"id":99249,"date":"2021-10-21T08:00:48","date_gmt":"2021-10-21T15:00:48","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=99249"},"modified":"2023-06-26T15:58:03","modified_gmt":"2023-06-26T22:58:03","slug":"franken-phish-todayzoo-built-from-other-phishing-kits","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/21\/franken-phish-todayzoo-built-from-other-phishing-kits\/","title":{"rendered":"Franken-phish: TodayZoo built from other phishing kits"},"content":{"rendered":"

A phishing kit built using pieces of code copied from other kits, some available for sale through publicly accessible scam sellers or are reused and repackaged by other kit resellers, provides rich insight into the state of the economy that drives phishing and email threats today. We uncovered this phishing kit while examining an extensive series of credential phishing campaigns that all sent credentials to a set of endpoints operated by the attackers.<\/p>\n

We named the kit \u201cTodayZoo\u201d because of its curious use of these words in its credential harvesting component in earlier campaigns, likely a reference to phishing pages that spoofed a popular video conferencing application. Our prior research on phishing kits told us TodayZoo contained large pieces of code copied from widely circulated ones. The copied code segments even have the comment markers, dead links, and other holdovers from the previous kits.<\/p>\n

Today\u2019s phishing attacks operate on a landscape fueled by an evolved service-based economy<\/a> filled with efficient, reliable, and profitable offerings. Attackers who wish to launch a phishing campaign may rent their resource and infrastructure needs from phishing-as-a-service (PhaaS) providers, who do the legwork for them. Alternatively, they can make a one-time purchase of a phishing kit that they can \u201cplug and play.\u201d<\/p>\n

That\u2019s not to say that attackers who build their kits from the ground up are at a disadvantage. If anything, the abundance of phishing kits and other tools available for sale or rent makes it easy for a lone wolf attacker to pick and choose the best features from these kits. They put these functionalities together in a customized kit and try to reap the benefits all to themselves. Such is the case of TodayZoo: because of the consistency in the redirection patterns, domains, and other techniques, tactics, and procedures (TTPs) of its related campaigns, we believe that the actors behind it came across an old phishing kit template and replaced the credential harvesting part with its own exfiltration logic to make TodayZoo solely for their nefarious purposes.<\/p>\n

Since the first observed instances of the TodayZoo phishing kit last December, large email campaigns leading to it have continued without significant pause. Our analysis of its phishing page artifacts, redirection routines, and domain generation algorithm (DGA) methods for the initial sites helps ensure Microsoft Defender for Office 365<\/a> effectively protect customers from the said campaigns.<\/p>\n

Microsoft tracks unique phishing kits, phishing services, and other components used in phishing to better protect customers from malicious emails at a larger scale. Combined with our monitoring of individual credential campaigns and the latest evasion techniques<\/a>, our research into kits and services provides us with a better understanding of the structure of phishing email messages. Such threat intelligence and insights, in turn, feed into our protection technologies, such as Defender for Office 365 and Microsoft 365 Defender<\/a>.<\/p>\n

This blog post details some of the technical aspects of a phishing campaign based on the TodayZoo kit. It also provides information about \u201cDanceVida,\u201d a potential parent family of kits based on a shared resource link, and how it and other historical patterns figure in TodayZoo\u2019s code structure.<\/p>\n

What\u2019s in a kit?<\/h2>\n

A \u201cphishing kit\u201d or \u201cphish kit\u201d can refer to various parts of a set of software or services meant to facilitate phishing. The term refers most commonly to an archive file containing images, scripts, and HTML pages that enable an attacker to quickly set up an undetectable phishing page and collect credentials through it. However, \u201cphishing kit\u201d can also be used to refer specifically to the unique page itself that spoofs a brand and interacts with a user, collects the user\u2019s credentials, and posts them to an asset the attacker owns.<\/p>\n

Phishing kits are generally split into the following major components based on function:<\/p>\n