Fake Paypal pages are setup by cybercriminals for one simple goal: To get your credentials. Fake Paypal pages can be hard to distinguish from legitimate Paypal pages, and this is because these cybercriminals try to stay on top of their game.
Currently, if we take a look at VirusTotal, not one of the antivirus engines which is being used at VirusTotal is able to detect the fake PayPal page that is hosted on certif-verification.ddns.net, if we continue to take a look at the IPv4 address which is used by the domain, we will see that also there is zero detection.
A dive into certif-verification.ddns.net
During our daily hunt, we noticed a domain which is asking for PayPal credentials. We took a dive into that domain, and we noticed, that the domain does not belong to PayPal. This is where we continued our research into certif-verification.ddns.net.
The certif-verification.ddns.net domain should be considered dangerous at all times, there is no legitimate use for any internet user to connect to certif-verification.ddns.net.
Once we connected to certif-verification.ddns.net, we were given a PayPal login screen. A fake one, but it certainly did look real. It even had the lock in the browser.
As we continued, we also took a dive into the code which is serving the Fake Paypal page, and the following code got our attention.
The code above sends information obtained from the form towards /info/serv5201.php. Now knowing what type of URL the cybercriminal uses, we did a simple OSINT search, and we landed on various pages, that had found similar URL structures being used in other Fake PayPal pages.
For your convenience, we have added them to the references list.
certif-verification.ddns.net certif-veriff.ddns.net at-officielle.ddns.net certif-verif1.ddns.net certif-verif.ddns.net support2020-anc.ddns.net contents-infoss.com minemarket.fr 188.8.131.52 /info/serv5201.php