Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfee, Norton, and Paypal domains.

threat
CrmX phishing screenshot

Our Threat Intelligence Team was on the lookout for PayPal typosquatting domains, when one particular domain (paypalsec[.]us) led them to a far larger discovery – an entire network of threat activity, masquerading as numerous global brand names and infecting machines with a malicious file disguised as a remote monitoring tool – WinDesk.Client.exe.

The initial discovery

We found the domain (registered through NameSilo on 2022-08-18) using the Silent Push Live Unsanctioned Assets query – an A record search by qanswer, netmask and various other network parameters.

The domain had some text and images that mimicked Paypal’s actual website, but most of the content populated as unrelated placeholders, which suggested that the site had been built using a multi-purpose template, rather than coded from scratch.

Fake website
PayPal’s actual website

Threat actors aren’t in the business of coding individual websites for hundreds of malicious domains, and sometimes rely on communal site builders to put together phishing websites that target different brands.

The ‘Cancel Now’ button on this particular domain prompted a download of an executable file – WinDesk.Client.exe – that we offer further analysis of below.

The delivery method

Once we’d confirmed the identity of the domain, we analyzed WHOIS, IP and PADNS data in an attempt to find out what other activity it was linked to, leading us to another domain connected to the same Paypal phishing website – help01[.]us (also registered through NameSilo on 2022-08-18).

We repeated the process for the IP address associated with help01[.]us, and discovered 30 other domains connected to similar phishing websites, impersonating big name brands such as Amazon, Microsoft, Geek Squad, and Paypal, using the same basic phishing techniques with some subtle differences (see IoC list at the bottom of this article).

Instead of a ‘Cancel Now’ button, these websites featured an ‘Enter Code’ field.

After a few attempts, we entered a code that was accepted as valid, which started the download of WinDesk.Client.exe.

Fake Amazon page
Fake GeekSquad page

Analysing the trojan

WinDeskClient.Exe actively tries to stop itself from being run in a sandbox environment, using a combination of debugging restrictions and sleep timers, but our Threat Analysts were able to run it in a test environment in order to ascertain what the file actually does, and more importantly, where it sends information to.

Once run, WinDesk.Client.exe facilitates the install of a parent process – dfsvc.exe – with two further executables initiated from the level above:

> dfsvc.exe

> ScreenConnect.WindowsClient.exe

> screenconnect.clientservice.exe

In its legitimate guise, ScreenConnect.WindowsClient.exe is an executable file which belongs to the ScreenConnect platform (now known as ConnectWise Control), a widely-used remote access tool for customers of ConnectWise.

Process tree (Credit – app.any.run)

ScreenConnect.WindowsClient.exe does have the potential to record keystrokes, but its the final drop – screenconnect.clientservice.exe – that reveals the most information.

The service attemps to establish a connection with 104.168.5[.]29, which resolves to firsto[.]cc.

We weren’t able to ascertain precisely what data the client process is attempting to send, but the security implications are clear and obvious.

Links to Norton and GeekSupport scams

A passive DNS replication check shows that the server is linked to to another IP – 198.23.212[.]167 – which is connected to phishing sites that are actively impersonating brands such as Norton and GeekSupport:

  • firsto[.]top
  • firsto[.]cc
  • mslxt[.]xyz
  • ncareback[.]xyz
  • backup02[.]xyz
  • gkscare[.]com
  • geeksupportcare[.]com
  • xpchelps[.]us
  • support2norton[.]us
  • xpchelp[.]us
Network communication from screenconnect.clientservice.exe

The attack vector likely originates via email, with threat actors gaining the trust of users before fooling them into entering a code (usually via a telephone conversation) that prompts the download.

A few weeks ago, GeekSquad customers fell victim to a scam featuring a fake website, that asked them to contact a phone number to cancel a fake subscription. Norton customers experienced the same basic scam in June,

It’s safe to assume that the version of WinDeskClient.Exe we analysed, and where it’s attempting to send information to, was an integral part of both scams.

Further investigation uncovered over 350 domains hosted among 42 IP addresses over the last month, impersonating not just Norton and GeekSquad, but big names such as Amazon and MacAfee (see IoC list at the bottom of this article).

The majority of these domains had three things in common:

  • They were all registered on NameSilo;
  • The used *.dnsowl.com nameservers;
  • The were hosted on low-density IP addresses on AS-COLOCROSSING(30823)

Thankfully, this particular group of threat actors spent too much time playing fast and loose with legitimate websites, and failed to secure their own internal infrastructure, leading us to some interesting discoveries.

The front end operation

We’ve already blogged about open directories – they’re the ultimate quick win for anyone looking to secure entry into restricted file systems, without having to worry about phishing, social engineering or payloads.

Using the Silent Push Open Directory search, we quickly discovered an open index on 192.227.173.35, that contained a single compressed file – desk.zip.

The file contained a directory of website assets, including images, components, and, crucially, a database with username and password tables for accessing the control panel of the phishing page builder used to construct the malicious websites we’d already uncovered.

Phishing website builder
Phishing website builder

Unfortunately, we didn’t uncover anything further on the front end of the control panels, besides different variations of the phishing website and the domains used to download the malware (which we’d already uncovered), but nonetheless, it was an interesting insight into how threat actors put together their operation, and provided us with a significant amount of intel to pass on to our customers.

Follow us on LinkedIn and Twitter for weekly threat intelligence updates and research.

Indicators of Compromise

This list will not be updated after the initial blog post. For live tracking of malicious infrastructure subscribe to our enterprise service. Sign up for a trial.

Payload download domains

win01[.]xyz

win02[.]xyz

win03[.]xyz

win04[.]xyz

IP addresses

45.153.242[.]179

107.172.73[.]169

23.94.159[.]191

107.172.75[.]132

192.3.122[.]191

192.3.13[.]36

192.3.122[.]146

107.173.229[.]163

107.173.143[.]41

192.227.173[.]35

192.3.247[.]180

107.173.229[.]143

192.210.149[.]241

107.174.138[.]194

172.245.27[.]14

23.95.34[.]123

198.46.132[.]181

198.12.89[.]38

192.3.239[.]7

198.12.89[.]4

198.12.89[.]36

104.168.33[.]58

23.94.174[.]165

107.172.13[.]160

172.245.27[.]38

172.245.119[.]64

104.168.32[.]32

198.23.213[.]50

192.227.173[.]103

45.147.231[.]233

23.95.85[.]185

104.168.33[.]61

107.173.143[.]27

198.23.207[.]31

23.95.85[.]181

198.12.84[.]71

198.23.145[.]147

192.3.22[.]14

198.12.107[.]216

192.3.141[.]133

192.210.219[.]54

198.23.174[.]109

198.23.212[.]164

198.23.212[.]193

104.168.5[.]29

Phishing domains

firsto[.]top

firsto[.]cc

mslxt[.]xyz

ncareback[.]xyz

backup02[.]xyz

gkscare[.]com

geeksupportcare[.]com

xpchelps[.]us

support2norton[.]us

xpchelp[.]us

1001[.]to

247bestbuy[.]cc

247bestbuy[.]info

247gscare[.]info

247help[.]live

247support[.]cc

247support[.]live

247supportme[.]live

247supportme[.]us

9115[.]to

91158[.]to

9190[.]us

9199[.]us

9220[.]us

acare[.]cc

acareme[.]cc

acaresupport[.]us

ahelp[.]care

ahelps[.]us

amaznhelp[.]us

amazonserver[.]us

amjhelp[.]cc

amzcare[.]cc

amzcare[.]info

amzcare[.]uk

amzhelp[.]cc

amzhelp[.]live

amzhelp[.]uk

amzhelps[.]us

amzndesk[.]info

amzndesk[.]us

amznsupport[.]me

amzsupport[.]cc

amzsupport[.]top

amzsupports[.]us

appsdesk[.]us

asecures[.]top

ask4support[.]cc

ask4support[.]us

asupport[.]care

asupport[.]me

asupport[.]services

asupports[.]cc

asupports[.]info

asupports[.]live

asupports[.]us

azhelpdesk[.]us

bankingcare[.]us

bbbrefund[.]live

bbbrefund[.]us

bbhelp[.]live

bbhelp[.]us

bcare[.]cc

bcares[.]us

bestbuyhelp[.]us

bhelp[.]cc

bhelp[.]info

billingform[.]info

billingsdept[.]us

billingteam[.]cc

billingteam[.]info

billingteam[.]online

billingteams[.]us

bsupport[.]live

bsupports[.]live

bteam[.]live

buggu[.]info

cancel1[.]us

cancel2[.]us

cancel3[.]cc

cancel786[.]us

cancelforms[.]live

cancell[.]cc

cancell[.]us

cancellationsupport[.]live

cancellationsupport[.]us

cancellationsupprts[.]live

cancelnow[.]live

cancels[.]services

cancels[.]support

carehelp[.]us

cform[.]live

cform[.]online

chelp[.]care

chelp[.]cc

cscare[.]live

cscare[.]us

csupport[.]cc

cxsupport[.]cc

cxsupports[.]us

dcare[.]live

deskcare[.]live

deskcareme[.]cc

deskcares[.]cc

deskcares[.]online

deskhelps[.]cc

desksupports[.]cc

desksupports[.]live

desksupports[.]net

desksupports[.]us

dsupport[.]info

dsupport[.]live

esupport[.]cc

fcare[.]cc

fcare[.]live

fhelp[.]cc

fhelps[.]live

formlive[.]cc

formlive[.]info

forms911[.]us

formslive[.]cc

formslive[.]info

formslive[.]online

fsupport[.]cc

fsupport[.]info

fsupport[.]live

fsupport[.]online

fsupports[.]live

gcare[.]cc

gcare[.]live

gcares[.]us

gchelps[.]live

gchelps[.]us

geekcancel[.]us

geekcare[.]cc

geekhelp[.]us

geekhelps[.]us

geekrefund[.]live

geekrefund[.]online

geeksqad[.]cc

getforms[.]live

getforms[.]us

gethelpdesks[.]live

gethelpsupport[.]us

getset[.]cc

getset[.]info

ghelp[.]cc

ghelp[.]info

grefund[.]live

grefund[.]us

gscare[.]info

gscare[.]live

gscare[.]us

gsrefund[.]us

gssquads[.]us

gsupport[.]live

help01[.]us

help4support[.]live

helpcares[.]support

helpcares[.]us

helpcenter[.]top

helpcenters[.]cc

helpcenters[.]live

helpdeskme[.]live

helpdeskme[.]us

helpdesksupport[.]live

helpline247[.]cc

helpline247[.]live

helpline247[.]us

helplive[.]cc

helplive[.]us

helplives[.]cc

helplives[.]us

helpme159[.]live

helpnortn[.]us

helpnorton[.]us

helpnsupport[.]us

helpsupports[.]live

helpsupports[.]us

helptechme[.]info

helptechme[.]live

helptechme[.]us

hservice[.]cc

hsupport[.]live

hsupports[.]live

ihelp[.]care

isupport[.]info

isupport247[.]cc

isupport247[.]us

isupports[.]live

itcares[.]info

itcares[.]live

itcares[.]us

itdesk[.]cc

itdesks[.]cc

itdesks[.]live

itdesks[.]online

itdesks[.]us

jcare[.]us

jsupport[.]us

khelp[.]live

ksupport[.]live

liveforms[.]us

login08[.]info

login08[.]top

mcare[.]live

mcfee247[.]cc

mcfee247[.]live

mcfhelp[.]us

mcfsupport[.]cc

mcfsupport[.]cloud

mcfsupport[.]live

mcfsupport[.]online

mcfsupport[.]us

mhelp[.]cc

mnsupport[.]info

mnsupports[.]live

mnsupports[.]us

mscare[.]me

mscare[.]online

mscares[.]cc

mscares[.]info

mscares[.]live

mscares[.]us

mshelp[.]cc

mshelp[.]me

mshelp[.]us

mshelpcare[.]cc

mshelpcare[.]info

mshelpcare[.]live

mshelpcare[.]us

mshelps[.]info

mshelps[.]live

mshelps[.]us

msjkp[.]top

msjkp[.]xyz

mskf[.]life

msn365[.]live

mssupport[.]cc

mssupports[.]live

mssupports[.]us

mstool[.]cc

mstool[.]info

mstool[.]live

msupport[.]cc

msupport[.]live

msupport[.]tech

msupports[.]info

msupports[.]live

msupports[.]online

msupports[.]us

myhelpcare[.]top

myhelpcares[.]info

myhelpcares[.]live

myhelpcares[.]us

myhelpdesk[.]cc

myhelpdeskme[.]us

myrefunds[.]live

mywebsecure[.]cc

mywebsecure[.]live

mywebsecure[.]us

ncares[.]online

nhelp[.]cc

nhelpcare[.]cc

nhelpcare[.]us

nllcancel[.]us

nortan[.]online

nortan360[.]us

nortancxs[.]us

nortanpro360[.]us

nortn[.]us

norton247[.]us

nortonpro[.]live

nortonpro[.]us

nrtsupport[.]online

nrtsupport[.]us

nsupport[.]cc

nsupport360[.]cc

nsupport360[.]us

nsupportme[.]us

ntcare[.]cc

ntcare[.]info

ntcare[.]live

ntcare[.]us

ntcares[.]live

onlinesupport[.]top

osupport[.]us

paycare[.]cc

paypalcare[.]cc

paypalcare[.]us

paypalhelp[.]cc

paypalhelp[.]live

paypalsec[.]us

paysupports[.]cc

paysupports[.]info

pcare[.]live

pchelps[.]cc

pchelps[.]live

pchelps[.]vip

pcservers[.]us

pcsupport[.]cc

phelp[.]info

primesupports[.]live

prsupport[.]cc

prsupport[.]live

pserver[.]cc

pserver[.]live

pserver[.]us

psupport[.]live

qhelp[.]cc

qhelp[.]live

qhelps[.]info

qhelps[.]live

qhelps[.]us

qsupport[.]live

refundassists[.]us

refundform[.]info

refundforms[.]us

refundhelp[.]us

refundscare[.]us

refundsnow[.]us

refundteam[.]us

rfundcare[.]cc

rfundcare[.]live

rfundcare[.]us

rhelp[.]live

securesupport[.]live

service247[.]us

support247[.]live

support99[.]cc

support99[.]live

support99[.]us

supportcancel[.]info

supportcancel[.]live

supportcancels[.]us

supportcare[.]cc

supportcares[.]cc

supportcares[.]live

supportcares[.]us

supportclients[.]cc

supportclients[.]top

supportcx[.]info

supportdesks[.]live

supportdesks[.]us

supporthelp[.]info

supportlive[.]cc

supportme11[.]live

supportme247[.]live

supportme247[.]us

supportpay[.]live

supports[.]win

supports[.]work

supports247[.]us

supports24x7[.]us

supportshelp[.]cc

supportslive[.]us

supportsx[.]info

supportsx[.]live

supportteams[.]live

supportus[.]us

supportusa[.]cc

suvfix[.]cc

suvfix[.]info

techamerica[.]live

techcare[.]live

techcares[.]cc

techcares[.]live

techhelps[.]live

techhelps[.]support

techhelps[.]win

techhelpsme[.]cc

techhelpsme[.]live

techhelpsme[.]online

techhelpsme[.]us

test01[.]cloud

testapp101[.]xyz

tservers[.]live

tservers[.]top

tsupport[.]cc

uscybersquad[.]live

vfix[.]info

vsupport[.]cc

waso[.]cc

waso[.]info

windesk[.]live

windowsupport[.]cc

windowsupport[.]info

winsupport[.]live

wnsupport[.]us

wservice[.]live

wsupport[.]cc

wsupport[.]us

ysupport[.]us

zsupport[.]cc

zsupport[.]info

zsupport[.]live