Scammers are targeting banking customers in India using a novel phishing attack to collect sensitive information such as internet banking credentials, mobile number and OTP to carry out fraudulent transactions, the country's cyber security agency has warned in its latest advisory.
The malicious activity is being carried out using the ngrok platform, a unique web application, it said.
"It has been observed that Indian banking customers are being targeted by a new type of phishing attack using ngrok platform."
"The malicious actors have abused the ngrok platform to host phishing websites impersonating internet banking portals of Indian banks," according to the advisory issued by CERT-In on Tuesday.
The Indian Computer Emergency Response Team or CERT-In is the federal technology arm to combat cyber attacks and guarding the cyber space against phishing and hacking assaults and similar online attacks.
Phishing denotes to the fraud when an attacker, masquerading as a trusted entity, tricks a victim into clicking evil links to steal passwords, login credentials and one-time password (OTP).
Using these phishing websites, the advisory elaborated, "malicious actors" are collecting sensitive information of the customers such as internet banking credentials, mobile number and OTP to perform "fraudulent transactions."
It said the phishing attacks have been seen to be triggered through SMSes containing links that end with ngrok.io/xxxbank.
The advisory explained this with a sample SMS.
"Dear customer your xxx bank account will be suspended! Please Re KYC Verification Update click here link http://446bdf227fc4.ngrok.io/xxxbank".
Once a victim clicks on this URL (universal resource locator) and log in to the phishing website using internet banking credentials, the attacker generates OTP for 2FA or two factor authentication which is delivered to the victim's phone number.
"The victim then enters this OTP in the phishing site, which the attacker captures," it said.
Finally, the attacker gains access to the victim's account using the OTP and performs fraudulent transactions, the advisory said.
The cyber security agency has suggested some "best practices" to nip these attacks in the bud, the most important being: "Look for suspicious numbers that don't look like real mobile phone numbers as scammers often mask their identity by using email-to-text services to avoid revealing their actual phone number."
"Genuine SMSes received from banks usually contain sender id (consisting of bank's short name) instead of a phone number in sender information field."
It further suggested internet banking users to "only click on URLs that clearly indicate the website domain."
"When in doubt, users can search for the organisation's website directly using search engines to ensure that the websites they visited are legitimate," it said.
A specific check against such attacks is "exercising caution towards shortened URLs, such as those involving bit.ly and tinyurl."
"Users are advised to hover their cursors over the shortened URLs (if possible) to see the full website domain which they are visiting or use a URL checker that will allow the user to enter a short URL and view the full URL," it said.
Users can also use the shortening service preview feature to see a preview of the full URL, the advisory stated.
It said bank customers should pay "particular attention to any mis-spelling and/or substitution of letters in the URLs of the websites they are browsing."
Some other counter-measures stated in the advisory are the often-repeated principles that are advised for safe browsing and accessing the internet.
"Install and maintain updated anti-virus and anti-spyware software, filtering tools (anti-virus and content-based filtering), firewall, and filtering services."
Update spam filters with latest spam mail contents, it said.
"Customers should report any unusual activity in their account immediately to the respective bank," it said.
"Phishing websites and suspicious messages should be reported to the CERT-In at incident@cert-in.org.in and respective banks with the relevant details for taking further appropriate actions," the advisory concluded.
(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
)