Skip to content

New Covid-19 themed phishing campaign in Ireland

  • by

A new phishing campaign was launched against the Irish users, providing an opportunity to review some tools for investigating this kind of activity.

This time the bad actors have crafted a HSE (Health Service Executive) themed phishing page. Victims will receive the malicious link via SMS, from a spoofed mobile number.

HSE phishing covid OSINT

Malicious domains are being hosted on IP address 84.32.248.121, which belongs to a Lithuanian hosting service UAB Cherry Servers.

At the time of writing, the following domains registered between the 22nd – 23rd January were observed:

  • https://omicron-covid19-pcr-test[.]com
  • https://omicron-covid19-pcr-test1[.]com
  • https://covid19-pcr-test2[.]com

It appears that the scammers will likely iterate domain names using digits, at least until they are successfully shut down by the hosting provider.

Interestingly, in December 2022 the same IP address was used to host another phishing site – previously scanned by URLscan:

  • my.secure-income-verify[.]info

*

The fake HSE website is a crude phishing attempt not only due to the modus operandi, but also the execution level and the lack of attention to details.

Blatant capitalisation and spelling errors like “varient”, “apparant”, “recieved” or “havingg” should be an early red flag, even if the visual theme of the website might appear deceivingly legitimate.

Also, some of the links that were meant to be hyperlinked don’t open at all.

HSE phishing OSINT 2

No phishing would be complete with the usual illicitation attempt of your credit card details!

The page actually performs a validation check on whatever card number is entered, making it impossible to proceed if an invalid card number is given.

A handy tool comes to the rescue – Credit Card Generator and validator from neaPay – used legitimally for testing purposes. It allows for generating invalid, non-existing card numbers in a valid format.

phising HSE card

Snippet of source code performing the credit card number validation check:

The credit card details page is followed by a generic, fake 2FA verification prompt. The logic behind this part is to validate the phone number a user provides – so the scammers actually do send a code to the phone number provided by the prospective victim:

The final step looks like it will be “processing” in perpetuity, but in the event of providing an incorrect “one-time code” you will see an error message and a request to re-enter the code.

Although I would imagine that at least some people might at this stage get suspicious about this site.

Malicious site details

Leave a Reply

Your email address will not be published. Required fields are marked *