SOURCE DEFENSE RESEARCH INTELLIGENCE NEWSApril 8, 2025 |
LOCALIZED DOUBLE-ENTRY ATTACK AFFECTS HUNDREDS OF WEBSITES VIA DOZENS OF MALICIOUS DOMAINSClient-side attacks usually rely on a few malicious domains, but this one targets about ten times more sites using a double-entry method tailored to each site. The latest attack uncovered by the Source Defense Research team stands out for its extensive reach and site-specific customization—even supporting non-Latin, right-to-left languages. The attack originates from a first-party script that isn't obfuscated, perhaps as a method of avoiding suspicion. The image below shows an example of one of the affected websites, where the original form appears together with the fake form—but only for a split second—before the original form disappears, as shown in the subsequent image. ![]() The attack deploys fraudulent forms tailored to various websites, accommodating multiple languages. Below is an example of a deceptive form designed to illicitly capture sensitive user information. This particular form is crafted in Hebrew—the language of the targeted site—which is a right-to-left script utilizing non-Latin characters. Notably, there are various versions of the attack and some of them include developers' comments in Russian, as you can see in the image below. |
Any questions? Contact us at: support@sourcedefense.com For the latest cyber research news, follow us at https://x.com/sdcyberresearch |
|
|