{"id":109158,"date":"2023-03-27T08:00:48","date_gmt":"2023-03-27T08:00:48","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109158"},"modified":"2023-03-27T16:55:57","modified_gmt":"2023-03-27T16:55:57","slug":"ipfs-phishing","status":"publish","type":"post","link":"https:\/\/securelist.com\/ipfs-phishing\/109158\/","title":{"rendered":"How scammers employ IPFS for email phishing"},"content":{"rendered":"
The idea of creating Web 3.0 has been around since the end of 2000s<\/a>. The new version of the world wide web should repair the weak points of Web 2.0., some of which are: featureless content, prevalence of proprietary solutions, and lack of safety in a centralized user data storage environment, where a massive leak is likely should just one server be compromised. Web 3.0 is described<\/a> as a decentralized and open internet\u00a0\u2014 some of its features already implemented in today’s digital world.<\/p>\n Unfortunately, the “new internet” will still remain a playground for criminals who will employ cutting-edge technologies for their old sport of data theft, financial machinations and the like. In this article, I will dwell on how they use one of the WEB 3.0 technologies\u00a0\u2014 the distributed file system IPFS\u00a0\u2014 for email phishing attacks.<\/p>\n IPFS (InterPlanetary File System<\/em>) is a peer-to-peer distributed file system enabling users around the world to exchange files. Unlike centralized systems, IPFS uses addressing performed according to unique content identifiers (CID), and not file paths. CID is generated based on the file’s hash value and then recorded to a distributed hash table, which also contains information on the file owner. The file itself resides on the computer of the user who had “uploaded” it to IPFS, and is downloaded directly from that computer. The structure of IPFS is somewhat similar to the BitTorrent protocol which, too, is a distributed network where file exchange takes place directly between the users’ devices.<\/p>\n By default, uploading a file to IPFS or downloading it requires special software (IPFS client). For users to view the files residing in IPFS freely without installing any software, the so-called gateways are provided. A gateway is in fact a server with access to IPFS. To open a file via a gateway, a URL is required normally containing a gateway address, reference to IPFS, and the file’s CID. URL formats can be quite different, for example:<\/p>\n In 2022, scammers began actively using IPFS for email phishing attacks. They would place HTML files containing a phishing form in IPFS and use gateways as proxies, so that victims could open the file, whether or not running an IPFS client on their devices. The scammers would include file access links via a gateway into phishing letters dispatched to would-be victims.<\/p>\n The use of a distributed file system allows attackers to cut back on phishing page hosting costs. Besides, you cannot delete files uploaded by third parties from IPFS. If somebody wants a file to disappear from the system completely, they can urge its owners to delete it, but the method will probably never work with cybercriminals anyway.<\/p>\n IPFS gateway providers attempt to combat IPFS phishing by regularly deleting links to fraudulent files.<\/p>\n <\/a><\/p>\n Phishing page deletion notification<\/em><\/strong><\/p>\n Yet detection and deletion of links at gateway level does not always happen as quickly as the blocking of a phishing website, cloud form, or document. We have observed URL addresses of IPFS files that first appeared in October 2022 and remain operational at the time of this writing.<\/p>\n Phishing letters containing IPFS links are hardly ever too original\u00a0\u2014 they contain the typical phishing content the purpose of which is to obtain the victim’s account login and password.<\/p>\n <\/a><\/p>\n Phishing letter with an IPFS link<\/em><\/strong><\/p>\n It is a bit more interesting to examine the HTML pages the links lead to.<\/p>\n <\/a><\/p>\n HTML page used for phishing<\/em><\/strong><\/p>\n As can be seen on the screenshot above, the URL parameter contains the recipient’s e-mail address. Once it is modified, the page content will change too: the corporate logo on top of the phishing form and the email address entered into the login field. In this way, one link can be used in several phishing campaigns targeting different users\u00a0\u2014 sometimes even in dozens of campaigns.<\/p>\n <\/a><\/p>\n Phishing page modification<\/em><\/strong><\/p>\n The logo replacement effect is achieved using a simple JavaScript code. The script obtains domain info from the page URL parameter and substitutes it into the URL of the Google resource, from which a logo icon is then sourced.<\/p>\n <\/a><\/p>\n Company logo substitution<\/em><\/strong><\/p>\n The use of IPFS is not limited to mass mailing campaigns: it is used for complex targeted attacks too. Unlike the ordinary ones, targeted phishing campaigns are much better prepared, normally focusing on specific persons within the company, not just random users.<\/p>\nWhat is IPFS?<\/h2>\n
\n
Phishing and IPFS<\/h2>\n
Use of IPFS in targeted phishing attacks<\/h2>\n