Phishing is using account login, banking, identity, etc., in attacks planned by cybercriminals against the target person or organization. It is a social engineering attack, among the most preferred threats to obtaining sensitive information. Attackers can use the information they get through the Phi...
Phishing is using account login, banking, identity, etc., in attacks planned by cybercriminals against the target person or organization. It is a social engineering attack, among the most preferred threats to obtaining sensitive information. Attackers can use the information they get through the Phishing technique to obtain initial access to the target system, ensure persistence, bypass existing security controls, and fraud.
Size: 856.58 KB
Language: en
Added: Oct 06, 2025
Slides: 7 pages
Slide Content
How Cybercriminals Use
Phishing Kits
Threat Intelligence Team
23.05.2022
BD311221RA
2
What is Phishing?
Phishingisusingaccountlogin,banking,identity,etc.,inattacksplannedby
cybercriminalsagainstthetargetpersonororganization.Itisasocialengineering
attack,amongthemostpreferredthreatstoobtainingsensitiveinformation.
AttackerscanusetheinformationtheygetthroughthePhishingtechniqueto
obtaininitialaccesstothetargetsystem,ensurepersistence,bypassexisting
securitycontrols,andfraud.
Phishingthreatscanincludemaliciousfilesorlinksine-mailsspeciallycraftedfor
theattacker'stargetandfakewebpagesdesignedtoimpersonatethetarget
organization.
Themalicioustoolsattackersusetocollectsensitiveinformationfromusersby
creatingphishingwebsitesarecalledPhishingKits.
How Cybercriminals Use Phishing Kits
PhishingKitsidentifymalicioustoolsthatcombineallthecomponents
cybercriminalsneedtocreateaphishingcampaignwithfakeloginpages,scripts,
andtemplates.ThreatactorsoftenpreferPhishingKitsbecausetheirusedoesnot
requiretechnicalknowledgeandiseasilyaccessiblefromundergroundcrime
forumsandmarkets.
Phishersusethesekitstoquicklyandeasilycreatephishingsitesthatmimic
legitimatewebsitestostealsensitiveinformationsuchaslogincredentialsand
creditcardnumbers.
Phishing Kits
Figure 1:Example of Phishing Kit has sold in underground forums and markets
5
How Cybercriminals Use Phishing Kits
Phishing Kit Components
APhishingKitusuallycontainsthefollowingcomponents.
PhishingTemplate
ThePhishingTemplatecontainsthetemplatethatmimicsthedesignofthetarget
website.Thus,Phishercanreplicateanofficialwebsiteexactly.Themostcommon
methodisdownloadingacompletecopyofawebsite(includingHTML,Image,
Video,andPdffiles)tothelocaldirectoryusingtheHTTracktool.
Server-sideCode
ThecodethatwillrunontheserversideisthepartofthePhishingKitthatdoesthe
actualwork.Thiscodeisresponsibleforcapturingsensitiveinformationenteredby
targetedusersandsendingittoPhisher.
Figure 2:Server-side executing login.php code snippet to capture login information
6
How Cybercriminals Use Phishing Kits
OptionalCode
PhishingKitsmaycontainadditionalcodetocounterPhishers'Anti-phishing
measuresorfiltertrafficunsolicitedbyattackers.CountermeasuresthatPhishers
canimplementinPhishingKitsmayincludetechniquessuchascodeobfuscation,
URLshorteningorredirection,andrandomlygeneratedURLs.
Ifunwantedtrafficisdetectedbyanyofthechecksmadeonthestatements
mentionedabove,apagewiththeerror"404PageNotFound"isdisplayed.In
addition,itcanapplytechniquesthatincluderedirectingdifferentPhishingKitsto
legitimatewebsitesorsearchengines.Itisalsopossiblethathighlyadvanced
PhishingKitscanonlybeaccessedfromcertaincountriesandusedoncertain
devicestoensureitonlyworksundercertainconditions.
Figure 3:IP filtering to prevent unwanted traffic to the fake website
Figure 4:User-Agent filtering to prevent unwanted traffic to the fake website
Figure 5:Hostname filtering to prevent unwanted traffic to the fake website
7
How Cybercriminals Use Phishing Kits
Conclusion
Phishingkitsareapowerfultoolforattackers,allowingthemtoeasilyand
efficientlycarryoutattacks.However,theyarealsorelativelyeasytodetectand
block.Phishingkitsusuallyrelyonwell-knownvulnerabilitiesorweaknessesin
ordertowork,andsokeepingup-to-datewithsecuritypatchingandusingeffective
anti-phishingsolutionscangoalongwaytowardsprotectingyourorganisation
fromthesetypesofattacks.
Whilephishingattackscanbedevastating,itisimportanttorememberthatthey
arenotalwayssuccessful.Infact,manyorganisationsandindividualsarenow
muchmoreawareofphishingattemptsandarebetterequippedtodealwiththem.
Bybeingvigilantandtakingstepstoprotectyourself,youcanhelptoensurethat
youarenotthevictimofasuccessfulphishingattack.