{"id":38783,"date":"2021-02-16T14:56:58","date_gmt":"2021-02-16T19:56:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=38783"},"modified":"2021-02-16T14:56:58","modified_gmt":"2021-02-16T19:56:58","slug":"hosting-provider-phishing-web-page","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hosting-provider-phishing-web-page\/38783\/","title":{"rendered":"Hosting provider phishing"},"content":{"rendered":"<p>Today, we\u2019re recounting a fairly recent hijack of a personal account on a hosting provider\u2019s site. That kind of account is <a href=\"https:\/\/www.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/38632\/\" target=\"_blank\" rel=\"noopener nofollow\">very appealing to cybercriminals<\/a>. Here\u2019s how one attack worked, and how far this kind of breach can go.<\/p>\n<h2>Phishing scheme<\/h2>\n<p>The attack began with some classic phishing. In this case, they attempted to frighten the recipient into quick action by invoking a cyberattack \u2014 posing as the hosting provider, the crooks claimed they\u2019d temporarily blocked the account in response to an attempt to buy a suspicious domain through it. To regain control of the account, they needed the recipient to follow the link and log in to their personal account.<\/p>\n<div id=\"attachment_38784\" style=\"width: 1407px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/02\/16145042\/hosting-provider-phishing-email.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38784\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/02\/16145042\/hosting-provider-phishing-email.jpg\" alt=\"Phishing e-mail sent by cybercriminals posing as a hosting provider\" width=\"1397\" height=\"898\" class=\"size-full wp-image-38784\"><\/a><p id=\"caption-attachment-38784\" class=\"wp-caption-text\">Phishing e-mail sent by cybercriminals posing as a hosting provider.<\/p><\/div>\n<p>The message body is full of red flags. It contains neither the provider\u2019s name nor its logo, suggesting the use of a common template for clients of different hosters. The name appears just once, in the sender\u2019s name. What\u2019s more, that name does not match the mail domain, an obvious sign of foul play.<\/p>\n<p>The link leads to an unconvincing login page. Even the color scheme is off. The likely hope here is that the user will act on panic and not notice.<\/p>\n<div id=\"attachment_38785\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/02\/16145119\/hosting-provider-phishing-web-page.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38785\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/02\/16145119\/hosting-provider-phishing-web-page.jpg\" alt=\"Fake website pages\" width=\"1460\" height=\"558\" class=\"size-full wp-image-38785\"><\/a><p id=\"caption-attachment-38785\" class=\"wp-caption-text\">Fake website pages.<\/p><\/div>\n<p>As with any phishing, entering credentials on this page is equivalent to handing control to the cybercriminals. In this case, however, that means handing over the corporate website keys. Weirdly, they ask for some financial details as well, the purpose of which is unclear.<\/p>\n<h2>Why a hosting provider?<\/h2>\n<p>Take a look at the login page. All\u2019s well with the phishing site\u2019s certificates. Its reputation seems fine. That makes sense; cybercriminals didn\u2019t create the domain, they just hijacked it, likely using a similar attack.<\/p>\n<p>What cybercriminals can do with control of a personal account on a host\u2019s website depends on the provider. For a few likely examples, they can relink to other content, update site content through a Web interface, and change the FTP password for content management. In other words, cybercriminals have options.<\/p>\n<p>Possibilities too broad? Well, here are some more specific ideas. If cybercriminals take control of your site, they might add a phishing page, use your site to host a link for downloading malware, or even use it to attack your clients. In short, they can trade on your company\u2019s name and website reputation for malicious purposes.<\/p>\n<h2>How to guard against phishing attacks<\/h2>\n<p>Phishing e-mails can be very persuasive. To avoid getting hooked, first of all, employees need to be vigilant. We recommend that you:<\/p>\n<ul>\n<li>Maintain a policy of never clicking links to a personal account. Anyone who receives a worrying message from their hosting provider should log in to the legitimate site, starting by typing the address into their browser address bar.<\/li>\n<li>Turn on two-factor authentication on the provider\u2019s website. If the provider doesn\u2019t offer 2FA, find out when they plan to add the feature.<\/li>\n<li>Remain alert to obvious signs of phishing (such as a mismatch between the sender\u2019s name and e-mail domain, or incorrect domain names on websites). Ideally, train employees to identify phishing attempts (one option is to use an <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">online training platform<\/a>).<\/li>\n<li>Install corporate mail security solutions on all <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">servers<\/a> and <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">devices<\/a> employees use for Internet access.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>How, and why, cybercriminals attack accounts on hosting provider sites. <\/p>\n","protected":false},"author":2598,"featured_media":38786,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[19,4039,76,941],"class_list":{"0":"post-38783","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-email","10":"tag-hosting","11":"tag-phishing","12":"tag-web"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hosting-provider-phishing-web-page\/38783\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hosting-provider-phishing-web-page\/22531\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hosting-provider-phishing-web-page\/18023\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hosting-provider-phishing-web-page\/24246\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hosting-provider-phishing-web-page\/22315\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hosting-provider-phishing-web-page\/21083\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hosting-provider-phishing-web-page\/24762\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hosting-provider-phishing-web-page\/23974\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hosting-provider-phishing-web-page\/30129\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hosting-provider-phishing-web-page\/9351\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hosting-provider-phishing-web-page\/16424\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hosting-provider-phishing-web-page\/16976\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hosting-provider-phishing-web-page\/14499\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hosting-provider-phishing-web-page\/26259\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/hosting-provider-phishing-web-page\/26716\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hosting-provider-phishing-web-page\/23573\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hosting-provider-phishing-web-page\/28910\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hosting-provider-phishing-web-page\/28718\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=38783"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38783\/revisions"}],"predecessor-version":[{"id":38787,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38783\/revisions\/38787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38786"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=38783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=38783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}