vote

Agile Threat Actors Pivot from COVID-19 to Voter Registration Themes in Phishing Lures

Share with your network!

The rise in election-themed messages continues, from the recent campaigns on the U.S. President’s health, to the Democratic National Committee, to now impersonating the U.S. Election Assistance Commission (EAC), spotted by security researchers at KnowBe4. The latest messages spoof a voter registration page and attempt to collect personally identifiable information (PII). Proofpoint researchers identified similar messages in our data, as well as additional credential and information phishkits from the same actor, which we detail below. 

Impersonating the Election Assistance Commission 

Email lure impersonating

Figure 1: Email lure impersonating the Election Assistance Commission 

Hundreds of messages with the subjects “voter registration application details couldnt be confirmed”[sic] and “your county clerk couldnt confirm voter registration“[sic] were sent to recipients across hundreds of organizations, though there is no clear targeting of any specific industry. All messages, sent via SendGrid, purport to be from eac[@]usa[.]gov, which does not appear to be an official email address for the legitimate EAC.  

The link to “reconfirm application” takes users to a now-defunct landing page at “astragolf[.]it/wp-content/voting”, which was likely a compromised WordPress install. The landing page impersonates ServiceArizona, though the messages were sent to recipients across multiple states.  

information phishing landing page

Figure 2: Information phishing landing page, impersonating ServiceArizona 

Pivoting to find more phishkits 

Proofpoint collects data on phishkits, which are complete phishing web sites contained in a ready-to-deploy package. We found the above phishkit in our data (Figure 2). While examining it, we found this POST request:

POST request

Figure 3: POST request from voter registration information phishing page 

We searched our data for additional phishkits POSTing to the email address above, “obiri409[@]gmail[.]com”, and found several more pages, likely from the same actor. 

In mid-June 2020, the actor used the promise of a COVID-19 business grant to collect information from users, hosted at “yard65[.]net/wp-content/plugins/hello-doly/HM” (Figure 4). Interestingly, while the voter registration information phish is US-themed, this COVID-19 business grant references UK-based entities like HM Revenue and Customs

COVID business grant

Figure 4: COVID business grant themed information phishing page, POSTing to “obiri409[@]gmail[.]com” 

In late August 2020, the same actor used a PayPal themed information phishing landing page, hosted at “urbanheights[.]in/fullz/” seen below in Figure 5. 

payPal information phishing page,

Figure 5: PayPal information phishing page, POSTing to “obiri409[@]gmail[.]com” 

In early October 2020, we identified another voter registration impersonation page that’s nearly identical to the original voter registration landing page we began investigating. One small detail that’s different is the replacement of the Arizona MVP logo with the Election Assistance Commission (Figures 6-8). The page is hosted at “bisonengineers[.]com/wp-content/voting”, and though we were unable to capture POST data for this page, the striking similarity in both the look of the page and use of a compromised WordPress install suggests that it is the same threat actor. 

Information phishing landing page,

Figure 6: Information phishing landing page, impersonating the Election Assistance Commission, and nearly identical to a page seen previously by this actor (Figure 2) 

 Information phish landing page seeking more sensitive information

Figure 7: Information phish landing page seeking more sensitive information, such as Social Security Number, Tax ID, and Driver’s License number 
 

Conclusion 

Threat actors often draw inspiration from current events to brand their malicious messages. In these examples, Proofpoint observed an actor pivot from ever-present PayPal themes to COVID-19 business grants during the summer, when many businesses were reeling from the economic effects of the global pandemic. Now, as the US election draws closer, many individuals are confirming their voter registration status. Using messages that suggest voter registration is invalid drives user urgency and uncertainty in an election season. The last messages we observed from this actor using voter registration themes were sent on October 7, 2020. This suggests that the actor may have already shifted to another type of lure. 

The major changes observed are in branding only–the actor continues to use similar UI elements and backend code, evidenced by the POST of user-supplied information to the same email address across multiple information phishing operations. As the election fades and a new story dominates the headlines, we’ll likely see this actor–and others like them–pivot once again to take advantage of current events.  

Indicators of Compromise (IOCs) 

IOC 

IOC Type 

Description 

astragolf[.]it/wp-content/voting 

URL 

ServiceArizona-themed information phish landing page 

urbanheights[.]in/fullz/ 

URL 

PayPal-themed information phish landing page 

yard65[.]net/wp-content/plugins/hello-doly/HM 

URL 

COVID business grant-themed information phish landing page 

bisonengineers[.]com/wp-content/voting 

URL 

Election Assistance Commission-themed information phish landing page