Fake Incident Report Used in Phishing Campaign, (Tue, Feb 17th)
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是Xavier Mertens收到一封针对Metamask用户的钓鱼邮件。邮件内容是关于启用2FA的请求,链接指向AWS服务器。邮件附件是一个假的安全事件报告,目的是吓唬受害者,促使他们启用2FA。PDF文件使用ReportLab生成,并非恶意。攻击手法较为低级,因为没有伪造发件人或定制内容。 接下来,我需要提取关键点:钓鱼邮件、Metamask用户、启用2FA、假报告、ReportLab生成、低质量攻击手法。 然后,把这些点用简洁的语言串联起来,确保不超过100字。要注意不要使用“这篇文章”或“文章内容总结”这样的开头。 最后检查一下是否涵盖了所有重要信息,并且语言流畅自然。 </think> 作者收到一封针对Metamask用户的钓鱼邮件,邮件要求启用2FA并附带一个假的安全事件报告PDF。该PDF通过ReportLab生成,并非恶意。攻击手法较为低级,未伪造发件人或定制内容。 2026-2-17 07:41:46 Author: isc.sans.edu(查看原文) 阅读量:6 收藏

This morning, I received an interesting phishing email. I’ve a “love & hate” relation with such emails because I always have the impression to lose time when reviewing them but sometimes it’s a win because you spot interesting “TTPs” (“tools, techniques &  procedures”). Maybe one day, I'll try to automate this process!

Today's email targets Metamask[1] users. It’s a popular software crypto wallet available as a browser extension and mobile app. The mail asks the victim to enable 2FA:

The link points to an AWS server: hxxps://access-authority-2fa7abff0e[.]s3.us-east-1[.]amazonaws[.]com/index.html

But it you look carefully at the screenshots, you see that there is a file attached to the message: “Security_Reports.pdf”. It contains a fake security incident report about an unusual login activity:

The goal is simple: To make the victim scary and ready to “increase” his/her security by enabled 2FA.

I had a look at the PDF content. It’s not malicious. Interesting, it has been generated through ReportLab[2], an online service that allows you to create nice PDF documents!

6 0 obj
<<
/Author (\(anonymous\)) /CreationDate (D:20260211234209+00'00') /Creator (\(unspecified\)) /Keywords () /ModDate (D:20260211234209+00'00') /Producer (ReportLab PDF Library - www.reportlab.com)
  /Subject (\(unspecified\)) /Title (\(anonymous\)) /Trapped /False
>>
endobj

They also provide a Python library to create documents:

pip install reportlab

The PDF file is the SHA256 hash 2486253ddc186e9f4a061670765ad0730c8945164a3fc83d7b22963950d6dcd1.

Besides the idea to use a fake incident report, this campaign remains at a low quality level because the "From" is not spoofed, the PDF is not "branded" with at least the victim's email. If you can automate the creation of a PDF file, why not customize it?

[1] https://metamask.io
???????[2] http://www.reportlab.com

Xavier Mertens (@xme)
Xameco
Senior ISC Handler - Freelance Cyber Security Consultant
PGP Key


文章来源: https://isc.sans.edu/diary/rss/32722
如有侵权请联系:admin#unsafe.sh