{"id":672,"date":"2025-05-08T20:01:19","date_gmt":"2025-05-08T17:01:19","guid":{"rendered":"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/"},"modified":"2025-05-08T20:01:19","modified_gmt":"2025-05-08T17:01:19","slug":"impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security","status":"publish","type":"post","link":"https:\/\/trustcrypt.com\/ar\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/","title":{"rendered":"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security"},"content":{"rendered":"<p>The ongoing struggle against online fraud is an ever-evolving challenge, characterized by a continuous adaptation between security teams and threat actors. The sophistication of these attacks increasingly blurs the distinction between legitimate user behavior and attempts at impersonation.<\/p>\n<p>Recent investigations have unveiled a new phishing kit specifically targeting payroll and payment platforms, with the intent to compromise victims\u2019 credentials and perpetrate wire fraud.<\/p>\n<p>Our inquiry commenced with the discovery of a fraudulent advertisement on search engines promoting a payroll and HR services company. This ad directed users\u2014both employees and employers\u2014to a phishing site masquerading as the legitimate service.<\/p>\n<p>In addition to capturing usernames and passwords while bypassing two-factor authentication (2FA), the phishing kit harbors malicious code that performs additional undetected actions. Utilizing an authenticated web worker, it employs a legitimate hosted web service to manipulate sensitive data fields pertaining to banking and payment information.<\/p>\n<p>During this investigation, the FBI issued a public service announcement highlighting that cybercriminals are exploiting search engine advertisements to impersonate legitimate websites, extending their reach to payroll systems, unemployment programs, and health savings accounts with the objective of executing fraudulent financial transactions.<\/p>\n<p>Prompt action led to the swift removal of the misleading advertisement from Google. Notifications have been sent to the targeted company and the parent organization of the web service being exploited.<\/p>\n<p>The targeted company operates in the payroll and HR sector, designed to navigate the complexities of global workforce management. We initially identified a rogue advertisement linked to the keywords &#8220;deel login,&#8221; with the fraudulent link appearing above the genuine search result for the official site.<\/p>\n<p>The fraudulent URL, employing a .ZA.COM subdomain, confuses users by redirecting them through cloaking mechanisms to decoy or phishing domains, allowing threat actors to alter destinations as needed.<\/p>\n<p>The phishing domains used\u2014first identified as &#8220;login-deel.app&#8221;\u2014were subsequently redirected to new malicious sites. The phishing interface presented a near-exact replica of the legitimate login page but disabled critical options such as &#8220;Log in using Google&#8221; and &#8220;Continue with QR code,&#8221; leaving only the fields for traditional authentication.<\/p>\n<p>Upon submission of their credentials, victims are manipulated into providing a security code received via email, effectively undermining the protective measures of 2FA when inputs are made on the deceptive site.<\/p>\n<p>A detailed network capture during our analysis revealed several unique aspects of this phishing kit. Notably, it utilized specific JavaScript libraries and implemented anti-debugging techniques to thwart deeper code examination, a tactic deployed commonly to obscure malicious activities.<\/p>\n<p>Further analysis of the files indicated different session management functions, explicitly related to banking operations. The kit incorporates a legitimate library to facilitate server-client interactions using technologies for real-time communications. This design allows the phishing kit to maintain an ongoing connection with the actors behind the attack for credential processing and to navigate 2FA requirements.<\/p>\n<p>The phishing kit is distinguished by several features including:<\/p>\n<p>&#8211; Usage of obfuscator tools<br \/>\n&#8211; Implementation of WebSockets for real-time data communication<br \/>\n&#8211; Functionality to manage session types linked to sensitive financial data<\/p>\n<p>The phishing campaign indicated multiple other potential targets in the payroll, HR, billing, and payment sectors, extending even to commerce platforms. Its operational history suggests that it had previously gone undetected for an extended period.<\/p>\n<p>Mitigation strategies against such threats include proactive monitoring for domain spoofing, swift user notifications, and comprehensive education on recognizing increasingly sophisticated phishing techniques. These measures are essential for safeguarding digital identities and ensuring that users maintain vigilance in digital interactions.<\/p>\n<p>The refined approach to security requires a collective responsibility, necessitating both users&#8217; cautious engagement and providers\u2019 commitment to preventative measures. Utilizing security solutions can reinforce this defense, providing an extra layer of protection against such malicious tactics.<\/p>\n<p><strong>Indicators of Compromise:<\/strong><\/p>\n<p>Redirect:<\/p>\n<pre><code>\ndeel.za.com\n<\/code><\/pre>\n<p>Phishing Domains:<\/p>\n<pre><code>\nlogin-deel.app\naccuont-app-deel.cc\njustvvokrs-login.cc\nvye-starr.net\nmaqreta.com\nctelllo.com\nangelistt.com\naccount.datedeath.com\naccount.turnkeycashsite.com\nadmin-shopffy.cc\nbiilll.com\napp-parker.com\nshluhify.com\nlogin-biil.net\nfounderga.com\nadmin-shoopiffy.com\naccess-shupfify.com\nvirluaterminal.net\n<\/code><\/pre>\n<p>JavaScript File Hashes (SHA256):<\/p>\n<pre><code>\nWorker.js: 56755aaba6da17a9f398c3659237d365c52d7d8f0af9ea9ccde82c11d5cf063f\nkel.js\/otp.js\/auth.js\/jquery.js: \n72864bd09c09fe95360eda8951c5ea190fbb3d3ff4424837edf55452db9b36fb\n6fb006ecc8b74e9e90d954fa139606b44098fc3305b68dcdf18c5b71a7b5e80f\n908a128f47b7f34417053952020d8bbdacf3aed1a1fcf4981359e6217b7317c9\n5dadc559f2fb3cff1588b262deb551f96ff4f4fc05cd3b32f065f535570629c3\n0ef66087d8f23caf2c32cc43db010ffe66a1cd5977000077eda3a3ffce5fa65f\n95d008f7f6f6f5e3a8e0961480f0f7a213fa7884b824950fe9fb9e40d918a164\n3e4e78a3e1c6a336b17d8aed01489ab09425b60a761ff86f46ab08bfcf421eac\na37463862628876cecfc4f55c712f79a150cdc6ae3cf2491a39cc66dadcf81eb\n15606c5cd0e536512a574c508bd8a4707aace9e980ab4016ce84acabed0ad3be\n81bcf866bd94d723e50ce791cea61b291e1f120f3fc084dc28cbe087b6602573\n1665387c632391e26e1606269fb3c4ddbdf30300fa3e84977b5974597c116871\nc56e277fd98fc2c28f85566d658e28a19759963c72a0f94f82630d6365e62c4\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>The ongoing struggle against online fraud is an ever-evolving challenge, characterized by a continuous adaptation between security teams and threat&#8230;<\/p>\n","protected":false},"author":1,"featured_media":673,"comment_status":"open","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[28],"tags":[73,89,77],"class_list":["post-672","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-fraud","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security - Trustcrypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcrypt.com\/ar\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security\" \/>\n<meta property=\"og:description\" content=\"The ongoing struggle against online fraud is an ever-evolving challenge, characterized by a continuous adaptation between security teams and threat...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcrypt.com\/ar\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustcrypt\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-08T17:01:19+00:00\" \/>\n<meta name=\"author\" content=\"Trustscrypt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"Trustscrypt\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/\",\"url\":\"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/\",\"name\":\"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security\",\"isPartOf\":{\"@id\":\"https:\/\/trustcrypt.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security.webp\",\"datePublished\":\"2025-05-08T17:01:19+00:00\",\"author\":{\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/#primaryimage\",\"url\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security.webp\",\"contentUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security.webp\",\"width\":1792,\"height\":1024,\"caption\":\"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustcrypt.com\/#website\",\"url\":\"https:\/\/trustcrypt.com\/\",\"name\":\"Trustcrypt\",\"description\":\"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustcrypt.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\",\"name\":\"Trustscrypt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"caption\":\"Trustscrypt\"},\"sameAs\":[\"http:\/\/trustcrypt.com\"],\"url\":\"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security - Trustcrypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcrypt.com\/ar\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/","og_locale":"ar_AR","og_type":"article","og_title":"[:en]Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security[:] - Trustcrypt","og_description":"The ongoing struggle against online fraud is an ever-evolving challenge, characterized by a continuous adaptation between security teams and threat...","og_url":"https:\/\/trustcrypt.com\/ar\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/","og_site_name":"Trustcrypt","article_published_time":"2025-05-08T17:01:19+00:00","author":"Trustscrypt","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"Trustscrypt","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"4 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/","url":"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/","name":"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security","isPartOf":{"@id":"https:\/\/trustcrypt.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/#primaryimage"},"image":{"@id":"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/#primaryimage"},"thumbnailUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security.webp","datePublished":"2025-05-08T17:01:19+00:00","author":{"@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security\/#primaryimage","url":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security.webp","contentUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/05\/impersonation-of-payroll-hr-and-benefits-platforms-by-cyber-criminals-a-growing-threat-to-data-and-financial-security.webp","width":1792,"height":1024,"caption":"Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security"},{"@type":"WebSite","@id":"https:\/\/trustcrypt.com\/#website","url":"https:\/\/trustcrypt.com\/","name":"Trustcrypt","description":"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcrypt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f","name":"Trustscrypt","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","caption":"Trustscrypt"},"sameAs":["http:\/\/trustcrypt.com"],"url":"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/"}]}},"_links":{"self":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/comments?post=672"}],"version-history":[{"count":0,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/672\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media\/673"}],"wp:attachment":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media?parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/categories?post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/tags?post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}