www.eff.org Open in urlscan Pro
2a04:4e42:400::201  Public Scan

Submitted URL: http://electronicfrontierfoundation.org/
Effective URL: https://www.eff.org/deeplinks/2015/08/new-spear-phishing-campaign-pretends-be-eff
Submission: On May 30 via api from BY — Scanned from FR

Form analysis 4 forms found in the DOM

POST /search/site

<form class="search-block-form search-site" action="/search/site" method="post" id="search-block-form" accept-charset="UTF-8">
  <div>
    <div class="container-inline">
      <h2 class="element-invisible">Search form</h2>
      <div class="form-item form-type-textfield form-item-search-block-form">
        <label class="element-invisible" for="edit-search-block-form--2">Search </label>
        <input autocomplete="off" type="text" id="edit-search-block-form--2" name="search_block_form" value="" maxlength="128" class="form-text">
      </div>
      <div class="form-actions form-wrapper" id="edit-actions"><button aria-label="search" type="submit" name="op"></button></div><input type="hidden" name="form_build_id" value="form-YtXjmN_Z0Vm176BZUms2Ey3QPpxZcBvqAftERxAMBSA">
      <input type="hidden" name="form_id" value="search_block_form">
    </div>
  </div>
</form>

POST /search/site

<form class="search-block-form search-site" action="/search/site" method="post" id="search-block-form" accept-charset="UTF-8">
  <div>
    <div class="container-inline">
      <h2 class="element-invisible">Search form</h2>
      <div class="form-item form-type-textfield form-item-search-block-form">
        <label class="element-invisible" for="edit-search-block-form--2">Search </label>
        <input autocomplete="off" type="text" id="edit-search-block-form--2" name="search_block_form" value="" maxlength="128" class="form-text" tabindex="-1">
      </div>
      <div class="form-actions form-wrapper" id="edit-actions"><button aria-label="search" type="submit" name="op"></button></div><input type="hidden" name="form_build_id" value="form-YtXjmN_Z0Vm176BZUms2Ey3QPpxZcBvqAftERxAMBSA">
      <input type="hidden" name="form_id" value="search_block_form">
    </div>
  </div>
</form>

POST https://supporters.eff.org/subscribe

<form action="https://supporters.eff.org/subscribe" method="post" class="newsletter-form" accept-charset="UTF-8">
  <h3 class="effector-title">Discover more.</h3>
  <div class="effector-desc"> Email updates on news, actions, events in your area, and more.</div>
  <div class="form-item form-type-textfield effector-form-item-email-address">
    <label for="edit-email" style="display:none">Email Address</label>
    <input placeholder="Email Address" type="email" name="email" value="" maxlength="128" class="form-text">
  </div>
  <div class="form-item form-type-textfield effector-form-item-postal-code">
    <label for="edit-postal-code" style="display:none">Postal Code (optional) </label>
    <input placeholder="Postal Code (optional)" type="text" name="postal_code" value="" maxlength="64" class="form-text">
  </div>
  <div class="form-item form-type-textfield effector-form-item-challenge">
    <label for="edit-challenge" style="clear: left; text-transform: none">Anti-spam question: Enter the three-letter abbreviation for <em>Electronic Frontier Foundation</em>:</label>
    <input type="text" name="challenge" value="" maxlength="3" size="6" class="form-text">
  </div>
  <div class="link-textfield">
    <div class="form-item form-type-urlfield form-item-link">
      <label for="edit-link">Don't fill out this field (required)</label>
      <input autocomplete="off" type="url" id="edit-link" name="link" value="" size="20" maxlength="128" class="form-text form-url">
    </div>
  </div>
  <input type="submit" name="op" value="Submit" class="effector-form-submit">
  <input type="hidden" name="form_id" value="eff_supporters_library_subscribe_form">
  <div class="thank-you"> Thanks, you're awesome! Please check your email for a confirmation link. </div>
  <div class="error-message"></div>
  <div class="broken-message"> Oops something is broken right now, please try again later. </div>
</form>

POST https://supporters.eff.org/subscribe

<form action="https://supporters.eff.org/subscribe" method="post" class="newsletter-form" accept-charset="UTF-8">
  <h3 class="effector-title">Discover more.</h3>
  <div class="effector-desc">Email updates on news, actions, events in your area, and more.</div>
  <div class="form-item form-type-textfield effector-form-item-email-address">
    <label for="edit-email" style="display:none">Email Address</label>
    <input placeholder="Email Address" type="email" name="email" value="" maxlength="128" class="form-text">
  </div>
  <div class="form-item form-type-textfield effector-form-item-postal-code">
    <label for="edit-postal-code" style="display:none">Postal Code (optional) </label>
    <input placeholder="Postal Code (optional)" type="text" name="postal_code" value="" maxlength="64" class="form-text">
  </div>
  <div class="form-item form-type-textfield effector-form-item-challenge">
    <label for="edit-challenge" style="clear: left; text-transform: none">Anti-spam question: Enter the three-letter abbreviation for <em>Electronic Frontier Foundation</em>:</label>
    <input type="text" name="challenge" value="" maxlength="3" size="6" class="form-text">
  </div>
  <div class="link-textfield">
    <div class="form-item form-type-urlfield form-item-link">
      <label for="edit-link">Don't fill out this field (required)</label>
      <input autocomplete="off" type="url" id="edit-link" name="link" value="" size="20" maxlength="128" class="form-text form-url">
    </div>
  </div>
  <input type="submit" name="op" value="Submit" class="effector-form-submit">
  <input type="hidden" name="form_id" value="eff_supporters_library_subscribe_form">
  <div class="thank-you"> Thanks, you're awesome! Please check your email for a confirmation link. </div>
  <div class="error-message"></div>
  <div class="broken-message"> Oops something is broken right now, please try again later. </div>
</form>

Text Content

Skip to main content
 * About
   * Contact
   * Press
   * People
   * Opportunities
 * Issues
   * Free Speech
   * Privacy
   * Creativity and Innovation
   * Transparency
   * International
   * Security
 * Our Work
   * Deeplinks Blog
   * Press Releases
   * Events
   * Legal Cases
   * Whitepapers
   * Podcast
   * Annual Reports
 * Take Action
   * Action Center
   * Electronic Frontier Alliance
   * Volunteer
 * Tools
   * Privacy Badger
   * Surveillance Self-Defense
   * Certbot
   * Atlas of Surveillance
   * Cover Your Tracks
   * Crocodile Hunter
   * Street Level Surveillance
   * apkeep
 * Donate
   * Donate to EFF
   * Giving Societies
   * Shop
   * Other Ways to Give
   * Membership FAQ
 * Donate
   * Donate to EFF
   * Shop
   * Other Ways to Give


 * SEARCH FORM
   
   Search
   

--------------------------------------------------------------------------------

Email updates on news, actions,
and events in your area.
Join EFF Lists
 * Copyright (CC BY)
 * Trademark
 * Privacy Policy
 * Thanks

Electronic Frontier Foundation

Donate
Podcast Episode: Chronicling Online Communities
Electronic Frontier Foundation
 * About
   * Contact
   * Press
   * People
   * Opportunities
 * Issues
   * Free Speech
   * Privacy
   * Creativity and Innovation
   * Transparency
   * International
   * Security
 * Our Work
   * Deeplinks Blog
   * Press Releases
   * Events
   * Legal Cases
   * Whitepapers
   * Podcast
   * Annual Reports
 * Take Action
   * Action Center
   * Electronic Frontier Alliance
   * Volunteer
 * Tools
   * Privacy Badger
   * Surveillance Self-Defense
   * Certbot
   * Atlas of Surveillance
   * Cover Your Tracks
   * Crocodile Hunter
   * Street Level Surveillance
   * apkeep
 * Donate
   * Donate to EFF
   * Giving Societies
   * Shop
   * Other Ways to Give
   * Membership FAQ
 * Donate
   * Donate to EFF
   * Shop
   * Other Ways to Give


 * SEARCH FORM
   
   Search
   





NEW SPEAR PHISHING CAMPAIGN PRETENDS TO BE EFF

DEEPLINKS BLOG
By Cooper Quintin
August 27, 2015



NEW SPEAR PHISHING CAMPAIGN PRETENDS TO BE EFF

Share It Share on Twitter Share on Facebook Copy link



> Update 01/28/16: EFF now controls the Electronicfrontierfoundation.org domain
> and that URL currently redirects to this blog post. If you arrived at this
> page via a link in a message that may have been phishing, please let us know
> and we will investigate.

Google's security team recently identified a new domain masquerading as an
official EFF site as part of a targeted malware campaign. That domain,
electronicfrontierfoundation.org, is designed to trick users into a false sense
of trust and it appears to have been used in a spear phishing attack, though it
is unclear who the intended targets were. The domain was registered on August 4,
2015, under a presumably false name, and we suspect that the attack started on
the same day. At the time of this writing the domain is still serving malware.

Electronicfrontierfoundation.org was not the only domain involved in this
attack. It seems to be part of a larger campaign, known as “Pawn Storm”. The
current phase of the Pawn Storm attack campaign started a little over a month
ago, and the overall campaign was first identified in an October 2014 report
from Trend Micro (PDF). The group behind the attacks is possibly associated with
the Russian government and has been active since at least 2007.

The attack is relatively sophisticated—it uses a recently discovered Java
exploit, the first known Java zero-day in two years. The attacker sends the
target a spear phishing email containing a link to a unique URL on the malicious
domain (in this case electronicfrontierfoundation.org). When visited, the URL
will redirect the user to another unique URL in the form of
http://electronicfrontierfoundation.org/url/{6_random_digits}/Go.class
containing a Java applet which exploits a vulnerable version of Java. Once the
URL is used and the Java payload is received, the URL is disabled and will no
longer deliver malware (presumably to make life harder for malware analysts).
The attacker, now able to run any code on the user's machine due to the Java
exploit, downloads a second payload, which is a binary program to be executed on
the target's computer.

We were able to recover the following samples of the malicious Java code from
electronicfrontierfoundation.org.

Filename MD5 Sum SHA1 Sum App.class 0c345969a5974e8b1ec6a5e23b2cf777
95dc765700f5af406883d07f165011d2ff8dd0fb Go.class
25833224c2cb8050b90786d45f29160c df5f038d78f5934bd79d235b4d257bba33e6b3



The decompiled Java for App.class



The decompiled Java for App.class

The Go.class applet bootstraps and executes App.class, which contains the actual
attack code. The App.class payload exploits the same Java zero-day reported by
Trend Micro and then downloads a second stage binary, internally called
cormac.mcr, to the user's home directory and renames it to a randomly chosen
string ending in `.exe`. Interestingly, App.class contains code to download a
*nix compatible second stage binary if necessary, implying that this attack is
able to potentially target Mac or Linux users.

Unfortunately we weren't able to retrieve the second stage binary, however this
is the same path and filename that has been used in other Pawn Storm attacks,
which suggests that it is likely to be the same payload: the malware known as
Sednit. On Windows, the Sednit payload is downloaded to the logged-in user's
home directory with a randomly generated filename and executed. On running it
hooks a variety of services and downloads a DLL file. The DLL file is executed
and connects to a command and control server where it appears to verify the
target and then execute a keylogger or other modules as may be required by the
attacker.

Because this attack used the same path names, Java payloads, and Java exploit
that have been used in other attacks associated with Pawn Storm, we can conclude
that this attack is almost certainly being carried out by the same group
responsible for the rest of the Pawn Storm attacks. Other security researchers
have linked the Pawn Storm campaign with the original Sednit and Sofacy targeted
malware campaigns–also known as “APT 28”–citing the fact that they use the same
custom malware and have similar targets. In a 2014 paper the security company
FireEye linked the “APT 28” group behind Sednit/Sofacy with the Russian
Government (PDF) based on technical evidence, technical sophistication, and
targets chosen. Drawing from these conclusions, it seems likely that the
organization behind the fake-EFF phishing attack also has ties to the Russian
government. Past attacks have targeted Russian dissidents and journalists, U.S.
Defense Contractors, NATO forces, and White House staff. We do not know who the
targets were for this particular attack, but it does not appear that it was EFF
staff.

The phishing domain has been reported for abuse–though it is still active, and
the vulnerability in Java has been patched by Oracle. Of course this is an
excellent reminder for everyone to be vigilant against phishing attacks. Our SSD
guide contains advice on how to improve your security, watch for malicious
emails, and avoid phishing attacks such as this one.


RELATED ISSUES

Security
State-Sponsored Malware


RELATED CASES

Kidane v. Ethiopia
Share It Share on Twitter Share on Facebook Copy link



JOIN EFF LISTS


DISCOVER MORE.

Email updates on news, actions, events in your area, and more.
Email Address
Postal Code (optional)
Anti-spam question: Enter the three-letter abbreviation for Electronic Frontier
Foundation:
Don't fill out this field (required)
Thanks, you're awesome! Please check your email for a confirmation link.

Oops something is broken right now, please try again later.


RELATED UPDATES

Deeplinks Blog by Karen Gullo | April 1, 2024


OLA BINI FACES ECUADORIAN PROSECUTORS SEEKING TO OVERTURN ACQUITTAL OF
CYBERCRIME CHARGE

Ola Bini, the software developer acquitted last year of cybercrime charges in a
unanimous verdict in Ecuador, was back in court last week in Quito as
prosecutors, using the same evidence that helped clear him, asked an appeals
court to overturn the decision with bogus allegations of unauthorized access...

Deeplinks Blog by Paige Collings | March 8, 2024


FOUR VOICES YOU SHOULD HEAR THIS INTERNATIONAL WOMEN’S DAY

Around the globe, freedom of expression varies wildly in definition, scope, and
level of access. The impact of the digital age on perceptions and censorship of
speech has been felt across the political spectrum on a worldwide scale. In the
debate over what counts as free expression and how it...

Deeplinks Blog by Paige Collings, Thorin Klosowski | March 8, 2024


FOUR INFOSEC TOOLS FOR RESISTANCE THIS INTERNATIONAL WOMEN’S DAY 

While online violence is alarmingly common globally, women are often more likely
to be the target of mass online attacks, nonconsensual leaks of sensitive
information and content, and other forms of online violence. This International
Women’s Day, visit EFF’s Surveillance Self-Defense (SSD) to learn how to defend
yourself and...

Deeplinks Blog by Karen Gullo | February 7, 2024


PROTECT GOOD FAITH SECURITY RESEARCH GLOBALLY IN PROPOSED UN CYBERCRIME TREATY

Statement submitted to the UN Ad Hoc Committee Secretariat by the Electronic
Frontier Foundation, accredited under operative paragraph No. 9 of UN General
Assembly Resolution 75/282, on behalf of 124 signatories. We, the undersigned,
representing a broad spectrum of the global security research community, write
to express our serious concerns...

Deeplinks Blog by Karen Gullo | February 7, 2024


DRAFT UN CYBERCRIME TREATY COULD MAKE SECURITY RESEARCH A CRIME, LEADING 124
EXPERTS TO CALL ON UN DELEGATES TO FIX FLAWED PROVISIONS THAT WEAKEN EVERYONE’S
SECURITY

Security researchers’ work discovering and reporting vulnerabilities in
software, firmware, networks, and devices protects people, businesses and
governments around the world from malware, theft of critical data, and other
cyberattacks. The internet and the digital ecosystem are safer because of their
work.The UN Cybercrime Treaty,...

Deeplinks Blog by Cooper Quintin | January 31, 2024


WORRIED ABOUT AI VOICE CLONE SCAMS? CREATE A FAMILY PASSWORD

Your grandfather receives a call late at night from a person pretending to be
you. The caller says that you are in jail or have been kidnapped and that they
need money urgently to get you out of trouble. Perhaps they then bring on a fake
police officer or kidnapper...

Deeplinks Blog by Karen Gullo | January 29, 2024


IN FINAL TALKS ON PROPOSED UN CYBERCRIME TREATY, EFF CALLS ON DELEGATES TO
INCORPORATE PROTECTIONS AGAINST SPYING AND RESTRICT OVERCRIMINALIZATION OR
REJECT CONVENTION

Update: Delegates at the concluding negotiating session failed to reach
consensus on human rights protections, government surveillance, and other key
issues. The session was suspended Feb. 8 without a final draft text. Delegates
will resume talks at a later day with a view to concluding their work and
providing a...

Deeplinks Blog by Paige Collings | January 19, 2024


EFF’S 2024 IN/OUT LIST

Since EFF was formed in 1990, we’ve been working hard to protect digital rights
for all. And as each year passes, we’ve come to understand the challenges and
opportunities a little better, as well as what we’re not willing to accept.
Accordingly, here’s what we’d like to see a lot...
Deeplinks Blog by Bill Budington, Alexis Hancock | December 23, 2023


SKETCHY AND DANGEROUS ANDROID CHILDREN’S TABLETS AND TV SET-TOP BOXES: 2023 IN
REVIEW

In a series of investigations this year, EFF researchers confirmed the existence
of dangerous malware on set-top boxes manufactured by AllWinner and RockChip,
and discovered sketchyware on a tablet marketed for kids from the manufacturer
Dragon Touch.
Deeplinks Blog by Ross Schulman | December 13, 2023


SPRITELY AND VEILID: EXCITING PROJECTS BUILDING THE PEER-TO-PEER WEB

While there is a surge in federated social media sites, like Bluesky and
Mastodon, some technologists are hoping to take things further than this model
of decentralization with fully peer-to-peer applications. Two leading projects,
Spritely and Veilid, hint at what this could look like.There are many
technologies used behind the...


DISCOVER MORE.

Email updates on news, actions, events in your area, and more.
Email Address
Postal Code (optional)
Anti-spam question: Enter the three-letter abbreviation for Electronic Frontier
Foundation:
Don't fill out this field (required)
Thanks, you're awesome! Please check your email for a confirmation link.

Oops something is broken right now, please try again later.
Share It Share on Twitter Share on Facebook Copy link



RELATED ISSUES

Security
State-Sponsored Malware


RELATED CASES

Kidane v. Ethiopia



Back to top


FOLLOW EFF:

 * x
 * facebook
 * instagram
 * youtube
 * flicker
 * linkedin
 * mastodon
 * tiktok
 * threads

Check out our 4-star rating on Charity Navigator.


CONTACT

 * General
 * Legal
 * Security
 * Membership
 * Press


ABOUT

 * Calendar
 * Volunteer
 * Victories
 * History
 * Internships
 * Jobs
 * Staff
 * Diversity & Inclusion


ISSUES

 * Free Speech
 * Privacy
 * Creativity & Innovation
 * Transparency
 * International
 * Security


UPDATES

 * Blog
 * Press Releases
 * Events
 * Legal Cases
 * Whitepapers
 * EFFector Newsletter


PRESS

 * Press Contact


DONATE

 * Join or Renew Membership Online
 * One-Time Donation Online
 * Giving Societies
 * Shop
 * Other Ways to Give

 * Copyright (CC BY)
 * Trademark
 * Privacy Policy
 * Thanks

JavaScript license information