New phishing attack uses Morse code to hide malicious URLs

Discussion in 'other security issues & news' started by Minimalist, Feb 7, 2021.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,909
    Location:
    Slovenia, EU
  2. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    Why would you open an html file from an unknown person...

    And cmon, someone would really open an html file IN THE BROWSER and then think, oh this is Microsoft Excel program, totally not the browser that I just opened an html file with??

    It doesn't even matter morse code or not, if you open an html file from an unknown person AND THEN THINK ITS MICROSOFT EXCEL you deserve to get phished. Unless are you old grandma or grandpa, then you are forgiven :D
     
  3. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,102
    Location:
    Canada
    NS with Restrictions disabled:

    XSS Warning.png
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
     
  5. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,846
    Location:
    Italy
    In Italy this phishing attack on companies would be unlikely.
    We use electronic invoicing sent to the Tax Agency via a certified interchange system.
    Very rarely is the electronic invoice, in XML format, sent via certified e-mail (PEC).
    Any courtesy invoice that is sent to the company almost exclusively in PDF format has no legal value.
    So there is no reason for interaction.
     
  6. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
  7. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,102
    Location:
    Canada
    Not sure what you mean. I was just illustrating how NS can detect XSS attempts.
     
  8. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    There was no link mentioned in the article, where did you go to receive that notification?

    I assume you personally tested it yourself by editting the DOM on google.com?
     
  9. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,102
    Location:
    Canada
    No I just typed out one of the scripts from the link provided by the OP, then copied/pasted it into the address bar from the Google home page. NoScript alerted to the XSS attempt.
     
  10. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    To be honest, that JS by itself was safe, you can check the contents if you go to it http://coollab.jp/dir/root/p/434.js and then you unescape the content

    upload_2021-2-12_18-57-41.png

    Same for http://coollab.jp/dir/root/p/09908.js
    upload_2021-2-12_18-58-47.png

    It is really that bit over here form action that is the dangerous part, when you submit the form it carries the action described in the link http://www.tanikawashuntaro.com//cgi-bin/root-6544323232000/0453000.php?90989897-45453 which is now down (or we lack permissions to view it)

    So No script technically did nothing, because the script could have simply been pasted in the body instead of referring to a link with the script itself. But of course, that would not have circumvented the email filters
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.