Toll troll

"Don't feed the toll troll": Silent Push tracks new threat actor (IMP-1G) engaging in SMS phishing activities, targeting US and Canadian public services. 100+ IOFA domains discovered, with only 10% known to authorities.

Executive Summary

Silent Push Threat Analysts have developed a method for locating and tracking the deployment of SMS phishing domains – a.k.a. “smishing” – from a previously unknown threat actor, who we are designating IMP-1G.

The domains involved target users of US and Canadian regional and national public services, along with a quantity of standard financial phishing domains.

Services targeted include toll roads, mass transit systems, postal services, court payments, municipal payments, and state-owned utility companies.

US states targeted include San Francisco, Massachusetts, Florida, Georgia, Illinois, Indiana, Washington, North Carolina, New York, Ohio, Pennsylvania, Texas, Kansas, South Carolina, and Tennessee.

Canadian provinces and cities targeted include Montreal, Alberta, British Colombia, Edmonton, and Ontario.

From a single origin domain, our Analysts used the Silent Push Web Scanner to expose 100+ Indicator of Future Attack (IOFA) domains, 66 of which are involved in the aforementioned government smishing activity, with only 10% known to national law enforcement in the form of seizure notices.

Additional information

This blog contains a public overview of how we located, traversed and tracked the deployment of IMP-1G’s US and Canadian government services smishing domains, and associated phishing infrastructure.

Certain key Silent Push Web Scanner data types have been omitted for OPSEC reasons. Interested parties can email [email protected] with any queries.

Silent Push Web Scanner is available as part of a free Community Edition subscription. Sign-up here.

Background

Smishing involves a threat actor sending an unsolicited SMS message to a victim’s cell phone, usually containing a malicious link to a spoofed domain that’s then used to exfiltrate data, such as identity documents or payment card information.

In April 2024, the DOJ issued a public service announcement warning the public about smishing scams targeting toll road users, following a large amount of IC3 reports:

DOJ smishing advisory

In June 2024, the US Postal Service issued an advisory on fake package tracking messages being sent to citizens’ devices.

In May 2024, the FTC published a consumer alert detailing scam SMS messages asking users to pay an overdue toll fine.

SMS toll fraud – which features heavily in our research – involves a range of attack vectors, including the use of short codes or premium-rate phone numbers to extract money via the victim’s phone bill, and identity theft.

SMS phishing isn’t limited to users of government services. In July of last year, we published research outlining a complex brand impersonation smishing scam, targeting customers of US banks and financial institutions.

Initial intelligence report

Recent reports on X linked the domain nycitypayinvoice[.]com to an SMS phishing campaign that attempted to steal users’ credit card information, via a fake NYC payment order:

The domain was subsequently seized by the Kings County District Attorney’s office:

Pivot: Tracking IMP-1G metadata

To traverse associated infrastructure, our analysts constructed a custom Silent Push Web Scanner query, using a proprietary hash value, that tracked nycitypayinvoice[.]com metadata and on-page content.

This led us to a further cluster of domains, all with shared data characteristics (that we aren’t able to divulge in a public blog), engaged in the same government payment fraud activity, including:

  • southernconnectortolls[.]com
  • uspsmailupdate[.]com
  • gapeachpasstolls[.]com
  • paturnpikeinvoices[.]com
  • bcpay-infraction[.]com
  • us-courtweb[.]com

Pivot: Refining the regional IMP-1G datasets

To produce regional datasets of active domains, we amended our query to focus on state-specific infrastructure, and excluded any domains that returned a 404 error.

Here’s a results set featuring active domains targeting service users in NYC:

Here’s another example domain, this time targeting toll users in Kansas (drive-ks[.]org). It starts with a landing page sent from an SMS message, which then progresses to data harvesting, including payment card information:

IMP-1G IOFA Feed Analysis

We’ve constructed an IOFA Feed built from the various query and scan parameters our Analysts used to track the deployment of IMP-1G’s infrastructure across the Internet.

As of this writing, our feed contains 101 active threat domains, 66 of which are involved in US and Canadian government services phishing, with the remainder (35) involved in generic financial and crypto phishing activity (see below section).

IMP-1G TLD and ASN analysis

43 of the 66 government services domains target toll road and mass transit users, with the remainder dedicated to various regional and national government revenue services, including court payments, city fines and postal services.

IMP-1G nameserver and registrar distribution

Exactly two thirds (44) of domains target US users, with 20 domains directed at Canadian services.

As of writing, only 6 of the 66 domains feature seizure notices. Meaning only 10% of IMP-1G infrastructure is known by national law enforcement agencies.

Here’s the full list of known and unknown government phishing domains, as per our research:

Unknown infrastructure

DomainRegionService
a25-bridgepayment[.]comMontrealTransit
alberta-accounts[.]comAlbertaRegional government
alberta-infractions[.]comAlbertaRegional government
alberta-traffictickets[.]comAlbertaTransit
bayareafastrak-fees[.]comSan FranciscoTransit
bayareafastrakexpresslane[.]comSan FranciscoTransit
bayareafastrakinvoice[.]comSan FranciscoTransit
bayareafastrakinvoices[.]comSan FranciscoTransit
bayareafastrakstolls[.]comSan FranciscoTransit
bayareasf-fastrak[.]comSan FranciscoTransit
bc-fine[.]comBritish ColumbiaRegional government
bc-infractions[.]comBritish ColumbiaRegional government
bcpay-accounts[.]comBritish ColumbiaRegional government
bcpay-infraction[.]comBritish ColumbiaRegional government
canadapost-packagecenter[.]comCanadian GovernmentPostal
depositetransfercanada[.]comCanadian GovernmentNational government
epcor-account[.]comEdmontonUtilities
expresstollinvoice[.]comN/ATransit
ezdrivemas[.]comMassachusettsTransit
ezdrivematoll[.]comMassachusettsTransit
ezdrivematolls[.]comMassachusettsTransit
fastrak-payment[.]comSan FranciscoTransit
floridasunpassinvoice[.]comFloridaTransit
flpayheresunpass[.]comFloridaTransit
flsunpasspayhere[.]comFloridaTransit
gapeachpasstolls[.]comGeorgiaTransit
illinoistollwayinvoice[.]comIllinoisTransit
indianatollroads[.]comIndianaTransit
invoicesezdrivematolls[.]comMassachusettsTransit
mygoodtogoinvoice[.]comWashington StateTransit
mysunpassinvoices[.]comFloridaTransit
mysunpasstollsinvoices[.]comFloridaTransit
ncquickpassinvoice[.]comNorth CarolinaTransit
nycitypaynotice[.]comNew York CityRegional government
nycitypayparking[.]comNew York CityTransit
oh-lanes[.]comOhioTransit
ohioturnpiketolls[.]orgOhioTransit
ontario-courtspayment[.]comOntarioRegional government
ontariocanadacourt[.]comOntarioRegional government
ontariocourts-setfines-ca[.]comOntarioRegional government
ontariocourts-webpayment[.]comOntarioRegional government
ontariowebcourt-ca[.]comOntarioRegional government
paturnpikeinvoices[.]comPennsylvaniaTransit
paturnpikestolls[.]comPennsylvaniaTransit
paturnpiketollsinvoices[.]comPennsylvaniaTransit
pay-directnow[.]appN/AN/A
paybc-account[.]comBritish ColumbiaRegional government
paybc-fine[.]comBritish ColumbiaRegional government
paybc-infraction[.]comBritish ColumbiaRegional government
peachpasstolls[.]comGeorgiaTransit
peachpasstollservices[.]comGeorgiaTransit
revenuecanadadeposit[.]comCanadian GovernmentNational government
rmatollservices[.]comTexasTransit
service-courtus[.]comUS GovernmentNational government
southernconnectortolls[.]comSouth CarolinaTransit
sunpassinvoice[.]comFloridaTransit
sunpassinvoices[.]comFloridaTransit
sunpassinvoicestolls[.]comFloridaTransit
sunpasstollcheckout[.]comFloridaTransit
sunpasstollinvoices[.]comFloridaTransit
tennessetollinvoices[.]comTennesseTransit
texasrmatoll[.]comTexasTransit
tollon407-etr[.]comOntarioTransit
tollservicesma[.]comTexasTransit
us-courtweb[.]comUS GovernmentNational government
uscourt-ticket[.]comUS GovernmentNational government

Seized infrastructure

DomainServiceSeizure authority
nycitypay[.]comRegional governmentKings County District Attorney
nycitypayinvoice[.]comRegional governmentKings County District Attorney
sunpasstollsbill[.]comTransitFlorida Department of Law Enforcement
tollbymailsnyinvoice[.]comTransitKings County District Attorney
tollsbymailnyinvoice[.]comTransitKings County District Attorney
tollsbymailsinvoices[.]comTransitKings County District Attorney

Other IMP-1G Phishing Activity

As is usually the case with threat actors engaged in phishing activities, IMP-1G aren’t limiting themselves to public services.

Using proprietary content hashing, our researchers tracked numerous private IPs hosting IMPG-1G phishing domains with the following characteristics spread across different domain clusters:

  • .shop as a TLD
  • A focus on financial and crypto phishing
  • Random alphanumeric subdomains and apex domains, such as: inx-132244[.]shop
  • Targeted phishing activities spoofing well-known crypto brands
  • Deployed from July 2024 onwards
  • Hosted using popular bulletproof ASNs, such as ALEXHOST MD (200019) and PONYNET US (53667)
IP hostNumber of domains
176.123.1[.]122~100
107.189.16[.]129~60
185.12.14.83~80
80.249.144[.]196~100
77.232.41[.]192~20
91.142.78[.]2216
195.133.48[.]8712
62.106.66[.]18038
194.36.188[.]3289

IMP-1G crypto phishing

Our researchers were able to track IMP-1G crypto phishing infrastructure using a Silent Push hash value that identified matching content across all associated crypto sites.

services-ledger-hardware[.]com hosts a login page attempting to phish Ledger recovery phrases and wallet data:

services-ledger-hardware[.]com

support-theta-token[.]com is attempting to phish users of Theta Wallet, with a pixel perfect copy of the legitimate website.

Here’s a side-by-side analysis of the two domains:

Theta Wallet phishing page @ support-theta-token[.]com
Legitimate website @ wallet.thetatoken[.]org

Register for a free Community Edition account

All of the queries, lookups and scans we used to locate, track and monitor IMP-1G infrastructure are available as part of Silent Push Community Edition – a free threat-hunting and cyber defense platform featuring a range of advanced offensive and defensive tools.

Click here to sign up for a free account.

Enterprise users also have access to a dedicated IMP-1G IOFA Feed that contains a real time list of indicators from our research into the group.

Please reach out to us at [email protected] with any additional queries.

IMP-1G IOFAs

We’ve included the below indicators of public service smishing to aid law enforcement in their duties.

Silent Push Enterprise users have access to a dedicated IMP-1G IOFA Feed, updated in real-time with the full extent of IMP-1G indicators.

  • southernconnectortolls[.]com
  • uspsmailupdate[.]com
  • gapeachpasstolls[.]com
  • paturnpikeinvoices[.]com
  • bcpay-infraction[.]com
  • us-courtweb[.]com
  • a25-bridgepayment[.]com
  • alberta-accounts[.]com
  • alberta-infractions[.]com
  • alberta-traffictickets[.]com
  • bayareafastrak-fees[.]com
  • bayareafastrakexpresslane[.]com
  • bayareafastrakinvoice[.]com
  • bayareafastrakinvoices[.]com
  • bayareafastrakstolls[.]com
  • bayareasf-fastrak[.]com
  • bc-fine[.]com
  • bc-infractions[.]com
  • bcpay-accounts[.]com
  • bcpay-infraction[.]com
  • canadapost-packagecenter[.]com
  • depositetransfercanada[.]com
  • epcor-account[.]com
  • expresstollinvoice[.]com
  • ezdrivemas[.]com
  • ezdrivematoll[.]com
  • ezdrivematolls[.]com
  • fastrak-payment[.]com
  • floridasunpassinvoice[.]com
  • flpayheresunpass[.]com
  • flsunpasspayhere[.]com
  • gapeachpasstolls[.]com
  • illinoistollwayinvoice[.]com
  • indianatollroads[.]com
  • invoicesezdrivematolls[.]com
  • mygoodtogoinvoice[.]com
  • mysunpassinvoices[.]com
  • mysunpasstollsinvoices[.]com
  • ncquickpassinvoice[.]com
  • nycitypaynotice[.]com
  • nycitypayparking[.]com
  • oh-lanes[.]com
  • ohioturnpiketolls[.]org
  • ontario-courtspayment[.]com
  • ontariocanadacourt[.]com
  • ontariocourts-setfines-ca[.]com
  • ontariocourts-webpayment[.]com
  • ontariowebcourt-ca[.]com
  • paturnpikeinvoices[.]com
  • paturnpikestolls[.]com
  • paturnpiketollsinvoices[.]com
  • pay-directnow[.]app
  • paybc-account[.]com
  • paybc-fine[.]com
  • paybc-infraction[.]com
  • peachpasstolls[.]com
  • peachpasstollservices[.]com
  • revenuecanadadeposit[.]com
  • rmatollservices[.]com
  • service-courtus[.]com
  • southernconnectortolls[.]com
  • sunpassinvoice[.]com
  • sunpassinvoices[.]com
  • sunpassinvoicestolls[.]com
  • sunpasstollcheckout[.]com
  • sunpasstollinvoices[.]com
  • tennessetollinvoices[.]com
  • texasrmatoll[.]com
  • tollon407-etr[.]com
  • tollservicesma[.]com
  • us-courtweb[.]com
  • uscourt-ticket[.]com
  • nycitypay[.]com
  • nycitypayinvoice[.]com
  • sunpasstollsbill[.]com
  • tollbymailsnyinvoice[.]com
  • tollsbymailnyinvoice[.]com
  • tollsbymailsinvoices[.]com

“ViserBank” website templates for sale on Envato being used to spoof big-name banks. 2000+ phishing domains discovered targeting Capital One, Santander, BNP Paribas, Wells Fargo, Bank of America, and JP Morgan Chase.

Key Findings

  • “ViserBank” templates, sold on Envato, are being used to create scam banking websites
  • Brands impersonated include Capital One, Wells Fargo, Bank of America, JPMorgan Chase, Santander Bank, and Virgin Money
  • Domains discovered in the wild attempting to harvest identity data and login information

Executive summary

Silent Push Threat Analysts have discovered that Envato – one of the largest digital asset marketplaces in the world – are selling suspect e-banking templates under the name of ViserBank.

The templates are being used to spoof big-name banks including Capital One, Wells Fargo, Bank of America, JPMorgan Chase, Santander Bank, and Virgin Money, among others.

Most of the websites built using the templates are extremely low quality, and are engaged in active phishing campaigns attempting to harvest sensitive information, including identity documents and users’ banking information.

Silent Push are tracking ViserBank-related activity via proprietary content scans using Silent Push Web Scanner. Actionable ViserBank intelligence is being provided to Silent Push Enterprise customers via two dedicated IOFA feeds.

Background

“ViserBank” website templates are marketed on Envato’s CodeCanyon marketplace as a $99 solution for building “cross-platform digital banking systems”:

ViserBank on Envato marketplace
ViserBank on Envato marketplace

Last year, Reuters published an investigation on how cybercriminals are using Wyoming shell companies for global hacks. ViserLab – the development company behind ViserBank – claims to be headquartered in Wyoming.

ViserLab on Facebook
ViserLab on Facebook

Additional information

This blog contains a public overview of how we located and tracked the deployment of ViserBank templates, and the corresponding fake banking websites.

Certain key data types and threat-hunting techniques have been omitted for operational security reasons.


Sign-up for a free Silent Push Community account

Register for our free Community Edition to use all of the tools and queries mentioned in this blog.


Initial discovery

We recently noticed several websites, including onecapitalschoicebank[.]com, santender[.]net, and eastwestpremeircorp[.]com shared similar content traits, even though the domains themselves and the corresponding websites were unrelated.

Phishing site @ onecapitalschoicebank[.]com
onecapitalschoicebank[.]com

ViserBank content re-use

After analyzing this domain grouping, we found a specific phrase being reused across all domains. We then used a proprietary Silent Push hash value to search the internet for related sites sharing the same language.

One of the domains we uncovered was vinancebk[.]com, which references “Viser bank” within the HTML:

vinancebk[.]com
vinancebk[.]com

Pivoting on ViserBank content

We identified a series of alphanumeric phrases that we used to track links to dozens of low-quality banking websites by constructing a custom scraping algorithm in the Silent Push Web Scanner, that identified new domains.

All of the returned domains featured a bank or financial service, with some names that appeared to have been made up.

While checking the source code of a few of the URLs, we noticed several references to “viserbank”:

Further investigation revealed that different sites built using ViserBank use slightly different libraries.

Traversing ViserBank infrastructure

Combining several more ViserBank Web Scanner parameters, we discovered more than 2,000 unique domains and IPs, all using the same questionable platform, with many of them impersonating major brands.

Here’s a few examples. The phishing domain wellsfargo-inc[.]com attempts to steal Wells Fargo banking credentials:

Wells Fargo ViserBank phishing site
wellsfargo-inc[.]com

The domain features a form that asks for a “Wells Fargo Banking ID”, and the user’s password:

Malicious ViserBank web form
Malicious web form @ wellsfargo-inc[.]com

Here’s another phishing domain, boacreditunion[.]com, targeting Bank of America customers:

Bank of America phishing page
boacreditunion[.]com

XBANK

As well as spoofing legitimate brands, threat actors are using ViserBank templates to trick users into signing up for obscure banking services, and handing over private data at point of registration.

An “XBANK” registration form hosted on one such phishing domain – xactverse[.]com – includes a prompt to include the user’s name, address, phone number, social security number, and passport photo:

Phishing page @ xactverse[.]com
Phishing page @ xactverse[.]com
"Registration form" @ xactverse[.]com
“Registration form” @ xactverse[.]com

Mitigating ViserBank activity

We’ve constructed two Silent Push IOFA Feeds containing all the scam ViserBank domains and IP addresses gathered during our investigation, available to Silent Push Enterprise users.

Silent Push Community and Enterprise users can also use proprietary Web Scanner fields to track ViserBank content, and pinpoint pre-weaponized infrastructure.

Register for Community Edition

Silent Push Community Edition is a free threat-hunting and cyber defense platform featuring a range of advanced offensive and defensive lookups, web content queries, and enriched data types.

Click here to sign up for a free account.

IOFAs

  • boacreditunion[.]com
  • onecapitalschoicebank[.]com
  • vinancebk[.]com
  • wellsfargo-inc[.]com
  • xactverse[.]com