First-of-Its-Kind Attack Technique Scraped Certificate Data for Certificate Errors Phish

An example payload login page customized to the target. (Source: 秋葵视频色 | AppRiver)

Malicious actors leveraged a new technique for a certificate errors phishing campaign in which they scraped real certificate data and included it in their attack email.

Inside the Fake Certificate Error

In the middle of April, the 秋葵视频色 | AppRiver team detected an email that masqueraded as a 鈥淟et鈥檚 Encrypt Error Prevention鈥 message.

The email arrived with a personalized subject line that included the name of a domain owned by the recipient. It then informed the recipient that Let鈥檚 Encrypt had automatically detected an issue with their R3 digital certificate, noting that there was specifically a 鈥渃onflict in SSL/TLS certificate signature algorithm.鈥

To add a sense of legitimacy to its claim, the attack email pulled real certificate data and the DNS A-record to tailor the phishing message to the recipient鈥檚 domain.

Screenshot of the fake certificate errors email. (Source: 秋葵视频色 | AppRiver)
Screenshot of the fake certificate errors email. (Source: 秋葵视频色 | AppRiver)

Troy Gill, manager of security research at AppRiver, explained that this social engineering tactic isn鈥檛 something he sees every day.

鈥淚t is not often we see an attack technique we would classify as a 鈥榝irst,鈥欌 he explained. 鈥淭hat said, we predicted we would see attackers further personalizing and customizing their attacks this year, and this phishing attack fits the bill. We don鈥檛 recall ever seeing the cert info being leveraged like this.鈥

From there, the attack email warned the recipient that their website could 鈥渟uffer attacks such as POODLE-TLS鈥 (more information on the POODLE attack ) unless they clicked on a hyperlink reading 鈥淪tart the update process.鈥

The recipient鈥檚 compliance initiated the final stage of the phishing attack鈥攕tealing the recipient鈥檚 login information for their domain.

鈥淭he payload URL led to a credential harvesting site located at https://error-prevention-sys[dot]com/?u= (some generated code),鈥 noted Gill. 鈥淚t鈥檚 customized for the recipient鈥檚 specific web platform admin page. While testing, we observed the generic WordPress admin login page and Shopify login pages (depending on the target).鈥

An example payload login page customized to the target. (Source: 秋葵视频色 | AppRiver)
An example payload login page customized to the target. (Source: 秋葵视频色 | AppRiver)

Putting This Attack and the Sender Email Address into Context

Those responsible for this attack used spoofing techniques to make it appear as though it had originated from Let鈥檚 Encrypt. In reality, it had come from tlsreport@securemailer[dot]net.

A Google search for 鈥渟ecuremailer[dot]net鈥 came up with an automated email management service operated by an organization called 鈥淭he Sigma Two Group.鈥

At the time of writing, this website contained a dialog box that claimed to help visitors check the availability of a domain name of their choosing.

A screenshot of the securemailer[dot]net.
A screenshot of the securemailer[dot]net.

As shown in the image above, the website coincidentally lacked HTTPS protection.

This author tried numerous searches of claimed and unclaimed website names using the dialog box. Each search yielded the same result: an error message reading 鈥渘ot found.鈥

A screenshot of the 鈥渘ot found鈥 result yielded by securemailer[dot]net.

Since 秋葵视频色 | AppRiver first spotted this scam, users shared on the that they had received similar versions of the ruse. It鈥檚 possible that whoever launched this attack gathered all of these domain owners鈥 information using whois data or information that was publicly available on the targeted websites themselves.

How to Defend Against This Scam

The attack described above highlights the need for organizations to defend themselves against malicious actors and their constantly evolving phishing techniques. One of the ways they can do this is by investing in an email security solution that can scan incoming email messages for malware signatures, suspicious IP addresses, campaign patterns and other threat indicators. This solution should perform this analysis in real time in order to allow legitimate business correspondence to reach their intended destination.

Overcome phishers鈥 new tricks using the email threat protection tools from 秋葵视频色 | AppRiver.