Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Phishing Kit V3B (Exploit Kit) – Malware

June 5, 2024
Reading Time: 4 mins read
in Malware
Phishing Kit V3B (Exploit Kit) – Malware

Phishing Kit V3B

Type of Malware

Exploit Kit

Country of Origin

Unknown

Date of initial activity

2023

Targeted Countries

Ireland
Netherlands
Finland
Austria
Germany
France
Belgium
Greece
Luxembourg
Italy

Associated Groups

vssrtje

Motivation

Data Theft
Financial Gain

Attack Vectors

Phishing

Type of information Stolen

Financial Information

Overview

In a significant escalation of cybercrime, a sophisticated phishing kit named V3B has emerged, targeting banking customers across the European Union (EU). Uncovered by Resecurity, this phishing kit represents a formidable threat to financial institutions and their clients. Designed to intercept and exploit sensitive information, including login credentials and one-time passwords (OTPs), V3B employs advanced social engineering tactics to deceive victims into disclosing their personal data. Launched in March 2023 by the threat actor known as “Vssrtje,” the V3B phishing kit has swiftly gained traction within the cybercriminal community. It is distributed through a Phishing-as-a-Service (PhaaS) model, making it accessible to a wide range of fraudsters. The kit has been prominently featured in dark web forums and Telegram channels, where it has garnered a substantial following. With over 1,255 members in its Telegram channel, the scale of the operation reflects a serious and organized attempt to undermine the security of EU financial institutions. The V3B kit’s sophistication lies in its multi-faceted approach to phishing. It includes encrypted code to evade detection, customizable templates for a variety of European banks, and advanced features such as QR code and PhotoTAN support. These capabilities enable cybercriminals to bypass traditional security measures and conduct real-time interactions with victims, increasing the likelihood of successful fraud. The kit’s integration with a secondary component, uPanel, further enhances its effectiveness by allowing fraudsters to interact with victims and collect OTP codes in real-time.

Targets

Individuals

How they operate

At its core, the V3B phishing kit is engineered to deceive users into providing confidential banking information, such as login credentials and one-time passwords (OTPs). The kit is distributed through dark web forums and Telegram channels, where it has established a substantial user base. The malware’s delivery mechanism relies heavily on social engineering techniques, employing meticulously crafted phishing emails and fake websites that mirror legitimate banking interfaces. Victims are lured into entering their data, which is then intercepted by the kit’s sophisticated credential capture system. The operational architecture of V3B is built on two primary components: the phishing kit itself and the administrative panel known as uPanel. The phishing kit features encrypted code, obfuscated using JavaScript and other techniques to evade detection by anti-phishing systems and security tools. This obfuscation not only conceals the kit’s functionalities but also protects its source code from analysis and signature-based detection. The kit supports a wide array of financial institutions across Europe, with customizable templates that replicate the authentication and verification processes of various banks. One of the standout features of V3B is its advanced support for multiple authentication methods. The kit includes modules for QR code phishing, allowing attackers to exploit services that use QR codes for user authentication. Additionally, it supports PhotoTAN and Smart ID, reflecting a keen awareness of evolving 2FA technologies. The phishing kit’s uPanel component enables real-time interaction with victims, allowing fraudsters to initiate OTP and token requests and manipulate victim responses. This interactive capability significantly increases the likelihood of successful data capture and fraudulent transactions. The exfiltration of stolen data is executed through secure communication channels, with Telegram API being a primary conduit for relaying intercepted information back to the attackers. The V3B kit also incorporates advanced anti-bot measures to prevent detection by automated security systems, ensuring that phishing operations remain stealthy and effective. The kit’s modular design, including the ability to support over 54 financial institutions and various authentication methods, underscores its adaptability and the persistent threat it poses to financial security.

MITRE Tactics and Techniques

Initial Access Phishing (T1566): V3B is a phishing kit designed to deceive users into revealing sensitive information, such as credentials and OTP codes. It uses social engineering tactics to lure victims into entering their data on fake banking sites. Credential Access Credential Dumping (T1003): The kit collects login credentials and OTP codes entered by victims. It may also capture session tokens or other authentication details. Input Capture (T1056): The phishing kit’s interface captures inputs directly from users, including passwords and OTPs. Collection Data from Input Capture (T1056.001): V3B captures and transmits sensitive data entered by victims, such as login credentials and OTP codes, to the attackers. Command and Control Application Layer Protocol (T1071): The kit uses Telegram and other communication channels to relay stolen data back to the attackers. This involves using standard protocols to send data over the network. Exfiltration Exfiltration Over Command and Control Channel (T1041): The kit exfiltrates captured data via its communication channels, which include Telegram and other dark web platforms. Defense Evasion Obfuscated Files or Information (T1027): V3B employs obfuscated code to avoid detection by anti-phishing systems and security tools. It uses JavaScript obfuscation and other techniques to hide its malicious functions. Impact Data Manipulation (T1565): The phishing kit can potentially manipulate financial data by facilitating unauthorized transactions once credentials are compromised.
References
  • Cybercriminals attack banking customers in EU with V3B phishing kit
Tags: 2FACybercrimeEuropean banksEuropean UnionExploit KitMalwareOTPPhaaSPhishing
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial