SilkSpecter Hackers Target Black Friday Shoppers

Categories:

SilkSpecter, a Chinese threat actor, launched a phishing campaign in early October 2024, targeting European and American e-commerce shoppers seeking Black Friday deals. The attackers used fake discounted products to trick victims into revealing sensitive financial and personal information.

Stripe’s legitimate payment processing capabilities were exploited by a threat actor in order to steal Cardholder Data (CHD) from victims who were otherwise unaware of the situation. 

By disguising malicious activity within genuine transactions and employing IP-based language adaptation, the attackers successfully deceived a wider range of potential targets.

It leverages the oemapps SaaS platform to rapidly construct convincing phishing sites, primarily targeting e-commerce users with .top, .shop, .store, and .vip TLDs, often employing typosquatting techniques. 

 Uncovering the pattern among Black Friday-themed phishing pages.

Researchers  identified a pattern in Black Friday-themed phishing domains linked to SilkSpecter, which used deceptive “trusttollsvg” icons and “/homeapi/collect” endpoints to track victim interactions, allowing real-time monitoring of campaign success.

The SilkSpecter phishing kit employed a Black Friday theme to lure victims, which tracked user activity with OpenReplay, TikTok Pixel, and Meta Pixel, captured browser metadata, and dynamically translated content using Google Translate APIs to enhance its authenticity and effectiveness.

 Payment prompt screen on phishing page that uses Stripe

It’s phishing campaign exploited Stripe to steal victims’ PII, financial data, and phone numbers, potentially enabling further attacks like vishing and smishing and facilitating unauthorized access to victims’ accounts for financial fraud.

The phishing site, disguised as a legitimate retailer, covertly records user payment sessions and exfiltrates sensitive banking details to an attacker-controlled server, leveraging Stripe’s APIs while employing social engineering tactics like Black Friday discounts to lure victims.

Payment details exfiltrated over attacker controlled remote domain.

EclecticIQ analysts attribute phishing campaigns to Chinese threat actor SilkSpecter based on Mandarin comments in JavaScript code and “zh-CN” language tags in HTML, indicating development by Chinese-speaking individuals.

By leveraging Chinese-hosted CDN servers and SaaS platform oemapps to deploy phishing infrastructure, it utilizes multiple IP addresses and domains linked to Chinese entities to conduct widespread phishing attacks.

Use of OEMAPPS library in phishing page. 

The operations of SilkSpecter are frequently concealed through the utilization of Chinese domain registrars such as West263, Hong Kong Kouming, Cloud Yuqu, and Alibaba Cloud. 

Monitor URLs for phishing attacks with a Black Friday theme, paying particular attention to specific patterns and indicators of compromise (IOCs) associated with SilkSpecter. 

Detect suspicious network traffic to ASNs linked to Chinese entities, potentially indicating malicious activity, and employ virtual cards and payment restrictions to minimize the attack surface and protect against financial fraud.

Also Read:

Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here