#SheByte

🚨 Hunting #SheByte PhaaS Platform: The LabHost Successor
🎯 This #PhaaS targets major banks in Canada and USA, including Interac, delivery services, telecom, toll roads. It also extends to Coinbase, popular email providers like Yahoo, Gmail, and Outlook, and impersonates brands such as Bell, Apple, and Amazon.

Following the #LabHost takedown in early 2024, SheByte operators are working to fill the gap by promoting their platform via Telegram and releasing major updates:
πŸ”Ή Geofiltering: prevents access to the phishing page from outside the targeted regions.
πŸ”Ή Connection Type Filtering: restricts VPN, hosting, mobile.
πŸ”Ή Fingerprint Detection: detects bots and sandboxes.
πŸ”Ή Enhanced Control of Page Flow: enables real-time control over the victim’s interaction flow.
πŸ”Ή V2 Page Builder: phishing page builder that mimics legitimate sites, adds custom data-stealing forms, and requires no coding skills.

πŸ”— Execution chain:
Phishing link ➑️ Fake bank login page ➑️ Credential harvesting ➑️ OTP interception ➑️ Security question capture ➑️ Redirect to legitimate bank site

πŸ‘¨β€πŸ’» With #ANYRUN Sandbox, analysts can explore the phishing kit functionality available through the phishkit's admin panel: app.any.run/tasks/56ddc9be-3d3

Explore captured and detonated phishing site samples, most likely created using the SheByte phishing builder:
app.any.run/tasks/2b23cac6-fe3
app.any.run/tasks/6aacde46-d7e
app.any.run/tasks/d39f8b11-b22

πŸ” These #phishkits often include data collection forms. Victims are tricked into entering sensitive information, which is sent directly to the attacker. This behavior can be used as a hunting pivot:
πŸ”Ή /file/db_connect<digits?>.php + request body parameters: name=
πŸ”Ή /t3chboiguru<digits?>.php + request body parameters: usr= psd=

πŸ“Œ Indicators and patterns for hunting SheByte-related infrastructure:
CSS file hashes:
πŸ”Ή SHA256: 58d0a27afc6ed22f356c907579f15f41f120c913c118837dba9c1b8da13a5a4f
πŸ”ΉSHA256: bc054fd38e88a7c9c1db08bd40dfe7ad366fa23efdce184e372d2adb431c91d2

Reverse DNS reused across multiple phishing-related domains:
πŸ”Ή my1[.]bode-panda[.]shop

Favicon of FIRST Bank loaded from a non-legitimate domain:
πŸ”Ή SHA256: 6e18a721d5559f569e5a6585bb6430c1965788e4607ea6704601872de8168811
πŸ”Ή Legitimate domain: bankatfirst[.]com

A URL request chain with a low number of HTTP requests in the session:
πŸ”Ή /personal.html
πŸ”Ή /otp.html
πŸ”Ή /c.html

#IOCs:
172[.]93[.]121[.]9
162.241[.]71.139
172.93[.]120.134
santosjjax[.]com
ghreo[.]net
cractil[.]net
sitygma[.]net

πŸ‘¨β€πŸ’» SheByte Admin Dashboards:
www[.]lillliiilllliiiiilliilllllllliiii[.]site
jonathanserhan[.]shebyte[.]io

Analyze and investigate the latest #malware and phishing threats with #ANYRUN πŸš€

2025-04-18

SheByte, a newish Phishing-as-a-Service platform, is the latest go-to resource for credential-stealing cybercriminals.

#cybercrime #cybersecurity #phishing #credentials #SheByte

cnews.link/shebyte-phishing-as

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst