Trending

HomeBlog
Phishing Campaign Targets Greek Banking Users
Cyble-Greek-Banking-Phishing

Phishing Campaign Targets Greek Banking Users

Cyble Research and Intelligence Labs analyzes a sophisticated phishing campaign targeting Greek bank users.

JavaScript Keylogger used to Steal Credentials

During our routine threat-hunting exercise, Cyble Research & Intelligence Labs (CRIL) came across multiple URLs hosting pages pretending to be Greece’s tax refund site. The page mentions the tax refund amount and asks users to confirm their current account number to transfer funds. The page tricks users into providing their net banking credentials through this process.

Phishing pages are usually designed to send the victim’s credentials to the Threat Actor (TA) when the user clicks the submit button. The TA in this campaign has used a JavaScript keylogger to steal keystrokes when users enter their credentials on the phishing website. This sophisticated technique makes this campaign unique, as we rarely observe such techniques being used.

Phishing Pages Analysis

The figure below shows the phishing site with the official logo of the Greek Government website.

Figure 1 – Tax Refund Phishing Page

When users visit the website hosted on the URLs: hxxp://mygov-refund[.]me/ret/tax & hxxps://govgr-tax[.]me/ret/tax, the pages ask the users to confirm their current account number to transfer tax refund money.

While choosing the bank, the user is given the option to choose between seven major banks, including the National Bank of Greece, Alpha Bank, and WinBank.

Figure 2 – Bank Options

When the user selects the bank, the website redirects them to a page that contains a fake net banking login UI similar to the legitimate URLs being imitated.

report-ad-banner

The below image depicts the fake login UI hosted on the URL: hxxp://mygov-refund[.]me/bg/internet banking/tax pretending to be the National Bank of Greece’s net banking page.

Figure 3 – National Bank of Greece Login Page

The below image shows the fake login UI hosted on the URL: hxxp://mygov-refund[.]me/alpha/internet banking/tax, which pretends to be the Alpha Bank net banking page.

Figure 4 – Alpha Bank Login Page

Technical Analysis

The below JavaScript code snippet has been used to capture keystrokes entered on the website’s text fields and upload these captured credentials back to the Threat Actor’s Command and Control (C&C).

Figure 5 – Code to capture keystrokes

Traffic Analysis

The below image shows the network communication after capturing any keystrokes entered on the phishing website’s text field.

Figure 6 – Network Communication

Based on our investigation, CRIL observed that the IP address: 195.178.120[.]25 has been used as a base to host various malicious domains containing phishing pages related to tax refunds in Greece. The complete list of phishing sites can be found in the IOC section of this analysis.

Upon further investigation, we determined that this campaign started through phishing emails targeting Greek taxpayers.

Conclusion 

Phishing has been one of the most commonly used tactics leveraged by Threat Actors to harvest personal and financial information. In this particular case, we observed the TAs using sophisticated techniques to steal whatever inputs were entered in the text fields of their phishing sites without the need for further user input (such as clicking “Submit”).

This is a rarely seen feature, as it can capture credentials with minimal inputs from the user, making the campaign even harder to detect and analyze.

Cyble Research & Intelligence Labs actively monitors new malicious phishing campaigns to keep our readers updated with our latest findings about phishing and other types of data theft attacks.

Our Recommendations 

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:

  • Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic.  
  • Regularly monitor your financial transactions, and if you notice any suspicious activity, contact your bank immediately.  
  • Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.  
  • Refrain from opening untrusted links and email attachments without verifying their authenticity.

MITRE ATT&CK® Techniques 

TacticTechnique IDTechnique Name
Initial AccessT1566Phishing
Initial AccessT1190Exploit Public-Facing Application
Input CaptureT1056/001Input Capture: Keylogging

   

Indicators of Compromise (IOCs)

 

IndicatorsIndicator TypeDescription
hxxp://mygov-refund[.]me/ret/taxURLPhishing URL
hxxps://govgr-tax[.]me/ret/taxURLPhishing URL
hxxps://hodewood[.]com/URLPhishing URL
hxxp://rodriguez@hodewood[.]com/URLPhishing URL
hxxp://govgr-tax[.]me/ret/taxURLPhishing URL
hxxp://govgreece-tax[.]me/ret/taxURLPhishing URL
hxxps://mygovrefund-tax[.]me/c1/refundURLPhishing URL
hxxp://govgreece-tax[.]me/URLPhishing URL
hxxps://govgreece-tax[.]me/ret/taxURLPhishing URL
hxxps://govgr-refund[.]me/ret/taxURLPhishing URL

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading