Phishing Sites at Myjino.ru

Here is what I found in our customers traffic:

myjino[.]ru/
mc.yandex[.]ru/
wildblue-net-upd.myjino[.]ru/35c6cfba69650ab1fc8ff49f3bcb4532/db.php
login.wildblue[.]net/
http://www.jino[.]ru/
account.jino[.]ru/
mc.yandex[.]ru/
mc.yandex[.]ru/
jino[.]ru/help/

Staring at traffic in a SIEM for hours each day you get really good at identifying patterns of traffic that look suspicious. Obviously not ALL traffic to Russian domains is an IOC. However, when you see an American based host making outbound requests like this you should investigate surrounding traffic and determine if this matches the user’s typical browsing behavior.

Jino[.]ru appears to be a Russian web hosting provider and I know from previous investigations that Yandex[.]ru is a Russian owned Internet company that operates the largest search engine in Russia. Okay, not exactly a smoking gun. The two requests that stood out to me were:

wildblue-net-upd.myjino[.]ru/35c6cfba69650ab1fc8ff49f3bcb4532/db.php

And another reference to “wildblue”:

login.wildblue[.]net/

Why the weird sub-domain on myjino[.]ru? A quick Google search for “Wild Blue” shows it to be offering a legitimate Satellite Internet service called Exede. WildBlue’s site is http://www.wildblue.com:

I then wanted to find out if the company was also the registrant for WildBlue[.]net. It turns out that WildBlue[.]net was registered and operated by WildBlue Communications, which was acquired by ViaSat in 2009.

Going directly to login.wildblue[.]net shows this is the legitimate email inbox login portal for Exede customers:

And here is the HTML code confirming that WildBlue[.]net is on the up-and-up!

For comparison here is what wildblue-net-upd.myjino[.]ru looks likes:

To the unsuspecting user this site would appear to be completely identical. Well, it isn’t. For starters the login page isn’t using HTTPS. Here is a more detailed look at what’s going on:

The code shows the use of a Data URI scheme employing the optional base64 extension. The Data URI scheme allows you to embed text and binary data directly into the HTML without requesting it from servers using separate HTTP requests. In our case, the Data URI scheme is being used to embed a PNG. For example, looking at the following CSS code:

background-image: url(“data:image/png;base64,iVBOR…=”);

The “data:image/png;base64” tells the browser that the data is inline, is a PNG image and is base64 encoded. As you can see, the PNG is being used as the entire background image.

Here is the Data URI plugged directly into the browser:

Furthermore, we can see that the form action contains “db.php”, the method is “post”, and the type is “submit”. Here is what the POST request looks like:

My email address (Phishing) and password (Site) can be seen in the POST request above. We can now see that wildblue-net-upd.myjino[.]ru is a phishing site. Users are herded to these phishing sites through phishing email campaigns. Once the credentials are POSTed back to the threat actor’s server the page reloads to the legitimate login portal for the Exede email inbox. The user would then log in to their real account, totally unaware of what just occurred.

With access to a user’s inbox criminals could potentially find PII like phone numbers, credit card information, a physical address, and maybe even a SSN. Furthermore, they could also attempt to use the harvested credentials on popular banking and shopping sites as it’s common for people to reuse passwords on different accounts.

Here are some other sub-domains tied to myjino[.]ru that are likely phishing sites, as well as some Apple phishing sites hosted at that IP:

Above we see phishing sites for Bank of America, Wells Fargo, PayPal, TurboTax, Google, Verizon, and Apple to name a few. All of the sites listed above were registered from 02-09-16 to 02-27-16, with more likely to come.

I would recommend blocking 81.177.165.133. I might even go a step further and block the entire 81.177.0.0/16 network as there are more phishing sites being hosted throughout that block.

Sources:
VT detection for myjino[.]ru:
https://www.virustotal.com/en/url/d496ed109537bbfd14c67451e22a3e1b57a3611d3c09baff31bd2e1ca6c9a32e/analysis/1456350703/

Phishing history for myjino[.]ru:
http://support.clean-mx.com/clean-mx/phishing.php?domain=myjino.ru&sort=id%20DESC

Leave a Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: