BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • KFC app steals personal data of its customers


    KFC and McDonald's customers have been targeted in phishing campaigns in Saudi Arabia, the United Arab Emirates and Singapore, with the attackers stealing bank details from some of the victims.

    Security researchers at CloudSEK noticed that one of these campaigns was running through a domain posing as the Google Play Store and displaying a malicious Chrome browser app.

    When clicking on a malicious URL, the user is taken to a fake Google Play page with the "KFC Saudi Arabia 4+" application.

    Once installed, a shortcut to the application is created in the Chrome browser. When launched, KFC Saudi Arabia 4+ opens a Chrome application window that loads a malicious site that is not currently running.

    CloudSEK experts also discovered a second phishing website targeting KFC customers. When a victim tries to checkout on a phishing site, a pop-up window appears to fill in the user's details.

    The reviewers noted that the form was well designed as it prompted the user to enter a location using the Google Maps API. In addition, the phishing site only accepted payment card details that satisfied Luhn's algorithm to ensure that the card details were valid.

    After sending the card data, the user had to enter a one-time password received via SMS. After entering the password, the victim was taken to another site imitating McDonald's.

    Using Passive DNS and Reverse IP Lookup, CloudSEK researchers discovered additional domains hosted on servers used by the phishing site.

    The newsletter also encourages companies to identify and report impersonating domains and run awareness campaigns to inform customers about the organization's processes.

    Author DeepWeb
    Attackers inject malicious JS code on crypto scam sites
    What is the new ProxyNotShell exploit capable of?

    Comments 0

    Add comment