{"id":135,"date":"2023-07-19T16:21:29","date_gmt":"2023-07-19T21:21:29","guid":{"rendered":"https:\/\/freshphish.info\/?p=135"},"modified":"2023-07-19T16:21:29","modified_gmt":"2023-07-19T21:21:29","slug":"wordpress-blog-posts-host-phish","status":"publish","type":"post","link":"https:\/\/freshphish.info\/?p=135","title":{"rendered":"WordPress Blog Posts Host Phish"},"content":{"rendered":"\n<p>No, not this one. But I did find a phish being sent from what appears to be a compromised account linking to a phishing page hosted on a WordPress blog that was either hijacked or else created using the name of the compromised business. The phishing page the email linked to was just one blog post. There is another blog post with a different phish hosted on it.<\/p>\n\n\n\n<p>Here&#8217;s the email from the likely compromised email account:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"344\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image001.png\" alt=\"\" class=\"wp-image-136\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image001.png 839w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image001-300x123.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image001-768x315.png 768w\" sizes=\"auto, (max-width: 839px) 100vw, 839px\" \/><\/figure>\n\n\n\n<p>It has another email attached to it. They&#8217;re likely doing this because some email security products used to not scan attached .msg files for malicious links or attachments. Does yours? Here is the email that is attached to this one:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image002.png\" alt=\"\" class=\"wp-image-137\" width=\"880\" height=\"540\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image002.png 946w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image002-300x184.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image002-768x472.png 768w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><\/figure>\n\n\n\n<p>Note the link goes to a Blogspot blog named the same name as the sending domain. Here&#8217;s what that page looks like:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"537\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image004-1024x537.png\" alt=\"\" class=\"wp-image-138\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image004-1024x537.png 1024w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image004-300x157.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image004-768x402.png 768w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image004.png 1246w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This page links to the following page:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"948\" height=\"222\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image005.png\" alt=\"\" class=\"wp-image-139\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image005.png 948w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image005-300x70.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image005-768x180.png 768w\" sizes=\"auto, (max-width: 948px) 100vw, 948px\" \/><\/figure>\n\n\n\n<p>Which, thankfully is no longer available. Going to the root of the Blogspot subdomain, you see a couple of posts including this one, as seen in this screenshot:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"836\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image006.png\" alt=\"\" class=\"wp-image-140\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image006.png 870w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image006-300x288.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image006-768x738.png 768w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/figure>\n\n\n\n<p>Here&#8217;s what the other blog post looks like:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"829\" height=\"824\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image007.png\" alt=\"\" class=\"wp-image-141\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image007.png 829w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image007-300x298.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image007-150x150.png 150w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image007-768x763.png 768w\" sizes=\"auto, (max-width: 829px) 100vw, 829px\" \/><\/figure>\n\n\n\n<p>This one links to a Google sign-in page that looks to redirect back to the blog as a comment. The blog is likely configured to not post comments immediately, but instead holds them for future publication once approved by the blog owner. Of course in this case, the owner won&#8217;t post them. They&#8217;ll just hold onto the credentials for future phish or other use of compromised Google credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"776\" src=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image008.png\" alt=\"\" class=\"wp-image-142\" srcset=\"https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image008.png 1022w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image008-300x228.png 300w, https:\/\/freshphish.info\/wp-content\/uploads\/2023\/07\/image008-768x583.png 768w\" sizes=\"auto, (max-width: 1022px) 100vw, 1022px\" \/><\/figure>\n\n\n\n<p>&#8211;Matt<\/p>\n","protected":false},"excerpt":{"rendered":"<p>No, not this one. But I did find a phish being sent from what appears to be a compromised account<\/p>\n<p><a href=\"https:\/\/freshphish.info\/?p=135\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">WordPress Blog Posts Host Phish<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-135","post","type-post","status-publish","format-standard","hentry","category-phish"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/freshphish.info\/index.php?rest_route=\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/freshphish.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/freshphish.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/freshphish.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/freshphish.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=135"}],"version-history":[{"count":1,"href":"https:\/\/freshphish.info\/index.php?rest_route=\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":143,"href":"https:\/\/freshphish.info\/index.php?rest_route=\/wp\/v2\/posts\/135\/revisions\/143"}],"wp:attachment":[{"href":"https:\/\/freshphish.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/freshphish.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/freshphish.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}