Skip to main content
Overview of the toll roads in the United States phishing campaign

Earlier this year, a new phishing campaign emerged, targeting toll roads systems across the United States, including EZDriveMA (Massachusetts), TheTollRoads (FasTrak (California)),  E-ZPass NY, SunPass (Florida), E-ZPass and etc.

Unfortunately, we identified this campaign with a two-week delay. However, since Jan 22, we have actively monitored and tracked the campaign, identifying and listing over 10,000 domains so far.

This toll phishing campaign closely resembles the Postal phishing campaign we analyzed earlier. The coding structure, domain patterns, and attack methods are nearly identical. Our investigation reveals that this campaign primarily distributes phishing messages via Apple’s iMessage, sending them in high volumes to potential victims.

Below is an example of a phishing message sent to targets:

phishing messages in Apple’s iMessage

 

In the past few days, we have observed messages being sent through U.S. telecommunications carriers to victims. These messages, delivered via SMS (MMS) by cybercriminals, contain a PDF file with an embedded phishing link. When the victim clicks the ‘PAY NOW’ button inside the PDF, they are redirected to a phishing page.

SMS (MMS) contain a PDF file

ALSO SEE: An overview of the world's largest postal services phishing campaign

Campaign Analysis So Far

To date, we have identified around 10,000 domains associated with this campaign. As shown in the table below, the toll system most affected by this phishing wave is EZDriveMA (Massachusetts), followed by TheTollRoads.

#Target%
1EZDriveMA82.4%
2thetollroads10.4%
3E-ZPass NY3.6%
4SunPass3.3%
5E-ZPass0.2%
6E-ZPass NJ0.1%

TLDs Used in the Campaign

As expected, “.top” continues to be the most frequently used TLD in this campaign (as the name suggests). The second most used TLD is “.xin”, followed by “.vip” in third place.

top 5 malicious TLDs
#TLD% of domain name registrations
1.top62.6%
2.xin28.5%
3.vip4%
4.sbs2.8%
5.live1%
6others1.1%
Also see: ICANN Issued Breach Notice to .TOP Registry After URLAbuse Complaint

Registrar Insights:

It comes as no surprise that Alibaba Registrar (IANA ID: 3775) has the highest number of phishing domain registrations, leading the list by a large margin. Following closely are NameSilo, LLC (IANA ID: 1479) and Gname.com (IANA ID: 1923). 

Registrar Insights
#RegistrarIANA ID% Registration
1Dominet (HK) Limited (ALIBABA.COM)377582.1%
2NameSilo, LLC14799.1%
3Gname.com Pte. Ltd19236.4%
4Hefei Juming Network Technology Co., Ltd (jumi.com)37582.2%
5Alibaba Cloud Computing Ltd. d/b/a HiChina (www.net.cn)15990.1%
5Others-0.1%

In terms of hosting infrastructure, we found that, just like the postal campaign, most phishing domains are hosted under AS 132203 - Tencent Building, Kejizhongyi Avenue.

Hosting Insights
#ASASN% hosted
1TENCENT-NET-AP-CN Tencent Building13220360.4%
2CLOUDFLARENET1333527.1%
3ALIBABA-CN-NET Alibaba US Technology Co.4510210.8%
4SEDO-AS - SEDO GmbH478461.1%
5PONYNET536670.3%
6BAXET-GROUP3983430.2%
7SARNICA-AS - Sarnica-Net LTD485840.1%

By notifying the relevant registries and registrars, we successfully take down approximately 80% of the identified domains this campaign.

URLAbuse continues to track this phishing campaign and notify relevant registries and registrars, providing all actionable evidence for swift takedown efforts. Our full dataset is publicly available on our feed, updated every 5 minutes. We also actively share this intelligence with our partners to strengthen response efforts.

This article is not complete, and we will update it in the future. 

For any inquiries, please contact us at team[at]urlabuse.com.

Add new comment

Plain text

  • No HTML tags allowed.
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA