{"id":44497,"date":"2022-06-03T06:16:39","date_gmt":"2022-06-03T10:16:39","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=44497"},"modified":"2022-06-03T06:16:39","modified_gmt":"2022-06-03T10:16:39","slug":"wise-transferwise-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/wise-transferwise-phishing\/44497\/","title":{"rendered":"Phishing for Wise guys"},"content":{"rendered":"<p>Attackers often send phishing e-mails in the name of well-known companies to extract credentials for users\u2019 personal accounts, phone numbers and other information that can be useful for scams or account takeovers. Of course, among the most attractive targets for phishers are clients of financial organizations such as <a href=\"https:\/\/www.kaspersky.com\/blog\/wells-fargo-phishing-identity-theft\/44327\/\" target=\"_blank\" rel=\"noopener nofollow\">banks<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptophishing-in-luno\/41538\/\" target=\"_blank\" rel=\"noopener nofollow\">cryptoexchanges<\/a>, payment systems and the like.<\/p>\n<p>This time we detected phishing exploiting the online financial service Wise (until recently \u2014 TransferWise), which is used by millions. Here we analyze the setup and explain how not to fall victim to fraud and data theft.<\/p>\n<h2>A word about Wise<\/h2>\n<p>Why Wise in particular? It\u2019s not just that people entrust their money to it. Until recently, the company was known as TransferWise, and its main business was low-cost cross-border money transfers. In 2021, it <a href=\"https:\/\/wise.com\/gb\/blog\/world-meet-wise\" target=\"_blank\" rel=\"nofollow noopener\">expanded its range of services<\/a> to include not only international transfers, but multi-currency accounts and debit cards (among others), too.<\/p>\n<p>As part of a rebranding, Wise dropped the \u201cTransfer\u201d from its name. Enter cybercriminals \u2014 who decided to exploit some initial confusion connected with the name change.<\/p>\n<h2>How the scheme works<\/h2>\n<p>An attack begins with a phishing e-mail purporting to be from the Wise support team. The e-mail informs the victim that due to the rebranding they need to \u201cmigrate their account to the new platform\u201d.<\/p>\n<div id=\"attachment_44502\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072234\/wise-transferwise-phishing-screen-1.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44502\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072234\/wise-transferwise-phishing-screen-1.jpg\" alt=\"E-mail supposedly from TransferWise about moving the user's account to a new platform\" width=\"1000\" height=\"600\" class=\"size-full wp-image-44502\"><\/a><p id=\"caption-attachment-44502\" class=\"wp-caption-text\">E-mail supposedly from TransferWise about moving the user\u2019s account to a new platform<\/p><\/div>\n<p>The inattentive user could easily mistake it as genuine, since wise.com appears in the line with the sender\u2019s name, and the message body contains the company logo with the trademark blue flag. A closer look, however, reveals a couple of more-red-than-blue flags: the sender\u2019s address consists of a random string of numbers along with words totally unrelated to Wise, and for some reason the domain belongs to\u2026 <a href=\"https:\/\/moringaschool.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Moringa School in Kenya<\/a>! The text itself is full of errors and typos, which a reputable company wouldn\u2019t permit.<\/p>\n<p>There are two links in the e-mail: one supposedly pointing to the new site, the other to contact the senders. In actual fact, both lead to the same page, which automatically redirects the victim to another \u2014 phishing \u2014 website.<\/p>\n<p>The phishing site looks far more convincing than the e-mail, with the same welcome message and design as the real Wise site. The only difference is the image on the left of the page, and also the URL. The latter unexpectedly displays the name of an <a href=\"https:\/\/apps.apple.com\/no\/app\/fivour-deal\/id1573744492?platform=ipad\" target=\"_blank\" rel=\"nofollow noopener\">obscure app<\/a> for finding restaurants and discounted services. At this point, the cybercriminals ask the user to enter their e-mail and password for account login.<\/p>\n<div id=\"attachment_44503\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072252\/wise-transferwise-phishing-screen-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44503\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072252\/wise-transferwise-phishing-screen-2.jpg\" alt=\"Phishing version of Wise login page\" width=\"1000\" height=\"680\" class=\"size-full wp-image-44503\"><\/a><p id=\"caption-attachment-44503\" class=\"wp-caption-text\">Phishing version of Wise login page<\/p><\/div>\n<p>However, credentials are not the only personal information collected: having \u201caccepted\u201d the e-mail and password (whether real or not, there are no checks), the site asks for the victim\u2019s phone number. Incidentally, you don\u2019t need to enter your phone number to login to the real Wise site.<\/p>\n<div id=\"attachment_44504\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072310\/wise-transferwise-phishing-screen-3.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44504\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072310\/wise-transferwise-phishing-screen-3.jpg\" alt=\"Lastly, the attackers ask for the Wise user's phone number\" width=\"1000\" height=\"600\" class=\"size-full wp-image-44504\"><\/a><p id=\"caption-attachment-44504\" class=\"wp-caption-text\">Lastly, the attackers ask for the Wise user\u2019s phone number<\/p><\/div>\n<p>When the user clicks the Continue button, the site seems to freeze: while the data is sent to the cybercriminals, the victim sees just a spinning logo with the word \u201cloading\u201d.<\/p>\n<div id=\"attachment_44505\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072333\/wise-transferwise-phishing-screen-4.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44505\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072333\/wise-transferwise-phishing-screen-4.jpg\" alt=\"The phishing page lost in thought\" width=\"1000\" height=\"650\" class=\"size-full wp-image-44505\"><\/a><p id=\"caption-attachment-44505\" class=\"wp-caption-text\">The phishing page lost in thought<\/p><\/div>\n<p>The impatient user who clicks the Continue button is again redirected to the official Wise site. The idea here is that even if the user senses something amiss and checks the URL at this point, they won\u2019t realize their data has fallen into cybercriminal hands and will just continue to go about their business.<\/p>\n<div id=\"attachment_44506\" style=\"width: 1710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072424\/wise-transferwise-phishing-screen-5.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44506\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/06\/02072424\/wise-transferwise-phishing-screen-5.jpg\" alt=\"The user is eventually redirected to the official Wise website\" width=\"1700\" height=\"880\" class=\"size-full wp-image-44506\"><\/a><p id=\"caption-attachment-44506\" class=\"wp-caption-text\">The user is eventually redirected to the official Wise website<\/p><\/div>\n<h2>Where does the data go<\/h2>\n<p>Most likely, it\u2019s phone numbers that cybercriminals want most of all. They probably collect them in databases and sell them to phone scammers. And from compromised accounts they can get <a href=\"https:\/\/wise.com\/help\/articles\/2932128\/i-need-to-edit-my-personal-details\" target=\"_blank\" rel=\"nofollow noopener\">additional information<\/a> about users, in particular, first name, surname and home address. Armed with such information, the phone scammers can sound far more convincing.<\/p>\n<h2>How to stay safe<\/h2>\n<p>To avoid the trap and protect your data, follow some <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">basic cybersecurity rules<\/a>.<\/p>\n<ul>\n<li>When you receive an e-mail seemingly from a well-known company, start with checking where it really came from. If the sender\u2019s address includes a meaningless jumble of numbers and letters, random words or an unusual domain, it\u2019s more than likely a scam.<\/li>\n<li>Don\u2019t follow links in e-mails and notifications, even if you think you know the sender; it\u2019s always better to open sites from your bookmarks or a search engine, or to enter URLs manually if you know them by heart.<\/li>\n<li>If you suspect phishing, contact the support team of the company the e-mail supposedly came from, and they\u2019ll tell you for sure whether it\u2019s real or fake. If necessary, they\u2019ll take action and alert other users.<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">reliable antivirus<\/a> with antiphishing and online fraud protection, which will warn you in a timely manner about the threat.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s how phishers extract phone numbers and credentials from users of Wise.<\/p>\n","protected":false},"author":2598,"featured_media":44501,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[4329,315,2581,76,726,4328,4327],"class_list":{"0":"post-44497","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-account-recovery","9":"tag-identity-theft","10":"tag-online-finance","11":"tag-phishing","12":"tag-scam","13":"tag-transferwise","14":"tag-wise"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wise-transferwise-phishing\/44497\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/wise-transferwise-phishing\/24231\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wise-transferwise-phishing\/19712\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/wise-transferwise-phishing\/9939\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/wise-transferwise-phishing\/26559\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wise-transferwise-phishing\/24517\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/wise-transferwise-phishing-2\/24883\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/wise-transferwise-phishing\/27245\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/wise-transferwise-phishing\/26785\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/wise-transferwise-phishing\/33239\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/wise-transferwise-phishing\/10751\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wise-transferwise-phishing\/18996\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wise-transferwise-phishing\/28795\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/wise-transferwise-phishing\/25082\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wise-transferwise-phishing\/30593\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wise-transferwise-phishing\/30342\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=44497"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44497\/revisions"}],"predecessor-version":[{"id":44510,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44497\/revisions\/44510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/44501"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=44497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=44497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=44497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}