Best News Network

The Bizarro Streaming Site That Hackers Built From Scratch

Fake landing pages are already a staple of cybercriminal trickery. Hackers have created have created hundreds of Netflix and Disney+ knockoffs in recent years. The BazaLoader group has made fake sites before, too, including a convincing impersonation of a lingerie retailer. But BravoMovies really does go above and beyond.

“We have not seen an entire fake streaming site created before,” says Sherrod DeGrippo, senior director of threat research and detection at Proofpoint. “This is a creative next level of social engineering.”

The details don’t always hold up to close scrutiny, but they give at least a light veneer of credibility to the enterprise. The BravoMovies homepage boasts of not only HD but “Full HD” and 4K streams. Its category offerings are familiar, even if the titles are decidedly not. It advertises mainstream perks like downloads for offline viewing and compatibility with a range of devices (including, confusingly, Blu-ray players).

To create convincing thumbnail posters of films, the attackers raided design-focused social network Behance for images, along with an advertising firm and a book called How to Steal a Dog. The results tilt toward the absurd, but honestly not much more so than what you might find at the bottom of your Netflix queue.

Screenshot: Proofpoint

To the extent that errors do jump out, well… maybe they do for you. “We’ve seen phishing pages that are built on free website builder sites and look like a child made them, and those are still successful,” says Hassold. “If someone has gotten to the point that they’ve made it to this landing page, the small spelling errors that most people would likely see and would raise a red flag are probably not going to move the needle very much.”

The scope of the campaign remains unclear, as does its ultimate goal. As a backdoor, BazaLoader acts as a sort of staging area for more purpose-built malware that comes later. Think of it as the Bifröst bridge of Norse/MCU legend, but offering passage for ransomware rather than surly Viking gods. whatever else rather than than a a path ransomware and whatever else are the Asgardians that actually make trouble. ProofPoint says it hasn’t detected whatever that second-stage malware is, but BazaLoader malware is closely linked to the group behind the notorious Trickbot malware.

The method also has its drawbacks. While it’s handy for getting around email protections, it’s easier to get people to click than to call. “Because it relies so much on
human interaction—that is, someone to actually pick up the phone and make a call—there is a lower likelihood of the recipient engaging with the threat actor,” says ProofPoint’s DeGrippo. She adds that the BazaLoader group typically sends tens of thousands of emails in a given campaign, with broad targeting across geographies and industries. 

Still, the fact that they put in so much time and effort indicates that despite the intricacies of the scheme, it must be working. “Criminals are inherently lazy,” says Hassold. “They’re going to do the least amount of work possible to make money.” There are more exciting heist plots out there. But points, at least, for originality.


More Great WIRED Stories

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! NewsAzi is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.