Skip to content →

Phishing Attack #4 – Dropbox

Clone kit revealed

A new fake Dropbox phishing scam targeting users of the online sharing and storage platform is currently in circulation. The scam invites readers to view files shared by another Dropbox user, and click on a link that redirects to a phishing website. 

screen-shot-2016-10-13-at-11-26-48-am

However, this phishing scam tries to fool users into submitting username and password details of their email address (YAHOO, Outlook, Gmail,AOL or others)  in order to gain access their account.

screen-shot-2016-10-13-at-11-26-57-am

Clicking on the icons a modal pops up asking for credentials.

screen-shot-2016-10-13-at-11-27-16-am screen-shot-2016-10-13-at-11-27-24-am

Once the credentials are filled and the “Submit” button is clicked, the credentials are sent through email to the phisher. 

Analyzing the web server is possible to retrieve the clone kit used by the attacker to create the phishing website. The clone kit is very simple and developed with basic programming skills. Below the structure and the source code of submit.php. “form.php” and “index.php” are 99% composed by HTML code.

screen-shot-2016-10-13-at-11-37-51-am

The developer downloaded all the icons to avoid recon.

screen-shot-2016-10-13-at-11-38-07-am

screen-shot-2016-10-13-at-11-28-32-am

Dropbox can easily identify this phishing attack analyzing the HTTP referer field of the HTTP packet, because the phishing website redirects to the official dropbox website.

 

Published in News >>

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *