KFC and McDonald’s prospects had been targeted via phishing campaigns across Saudi Arabia, UAE and Singapore, with payment information of some of them successfully stolen by attackers.
Spotted by security researchers at CloudSEK, the initially of these strategies labored by using a domain impersonating the Google Engage in Retailer and displaying a malicious, browser–based software for Chrome.
Upon landing on the malicious URL and clicking on the down load button, the text on the button improvements to ‘Install,’ which in flip prompts the user to set up the browser application ‘KFC Saudi Arabia 4+.’

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“Immediately after set up, a desktop shortcut for the exact same software is produced on the user’s desktop,” CloudSEK wrote in an advisory published in excess of the weekend.
“Double–Clicking the KFC Saudi Arabia 4+ app opens a chrome application window, which hundreds the website […], which appears to be down at the time of investigation.”
Even further, the team also uncovered a 2nd internet site pointing to KFC–focused phishing.
“This website is a subtle and elaborate phishing marketing campaign becoming used to steal the card aspects of the victims,” CloudSEK wrote.
“When the victim tries to area an order on the phishing internet site, they are presented with a pop–up window to fill in their details in the sort.”
According to the advisory, the form was well–designed, giving customers with solutions although filling up their addresses working with the Google Maps API. More, the site only recognized payment card particulars that content the Luhn algorithm to ensure that the cards currently being submitted had been legitimate.
“Just after distributing the card aspects, the target was prompted to deliver the 1 Time Password (OTP) gained on SMS,” reads the CloudSEK specialized write–up.
“Just after moving into the OTP, the target is taken to yet another website impersonating McDonald’s, […] At the time of producing, the website was inactive.”
Making use of Passive DNS and reverse IP lookups, CloudSEK’s scientists found added domains hosted on the servers utilized by the web-site impersonating KFC and McDonald’s.
“Users need to be vigilant whilst browsing web-sites and submitting their PII and banking facts,” CloudSEK warned.
The advisory also implies firms determine and report domains impersonating manufacturer names and trademarks and make inclusive recognition campaigns to educate shoppers about the organization’s procedures.
Extra normally, threat actors are consistently evolving ways, and that goes for phishing attempts as perfectly. For occasion, security scientists at Proofpoint have not too long ago spotted phishing strategies making use of Microsoft Sway.
Some parts of this report are sourced from:
www.infosecurity-journal.com