Skip to content

draschool.org #1154

@g0d33p3rsec

Description

@g0d33p3rsec

Comments

This domain is now hosting the phishing kit that previously albapietra[.]com[.]br, yanisac[.]com, atsbic[.]com[.]br, squad[.]cl, benyex[.]cl, lebomashilo[.]co[.]za, intrinsicisle[.]za[.]com, reluzformaturas[.]com[.]br, abcmueblesbogota[.]com, ergoterapiacaribu[.]ch, ijconnects[.]com, cbcaps[.]shop), bersowir[.]org, brunotasso[.]com[.]br, wisbechguide[.]uk, pescacancun[.]com, bkengineersindia[.]com, englishplusmore[.]com, carnesboinobre[.]com[.]br, technowide[.]com[.]tr, jestertunes[.]com, safecartusa[.]com, foreverfarley[.]com, azezieldraconous[.]com, westernautomobileassembly[.]com, littleswanaircon[.]com[.]sg, iwan2travel[.]com, applesforfred[.]com, theaerie[.]ca, nico[.]sa, ajstelecom[.]com[.]mx, and others.

I don't have screenshots for this one, but it has the same common indicator, uses Nuxt.js just like the others listed, and has the same pattern of HTTP requests.

Wildcard domain records

draschool.org|phishing

Sub-Domain records

No response

Hosts (RFC:953) specific records, not used by DNS RPZ firewalls

No response

SeafeSearch records

No response

Screenshots

Screenshot

371249609-18f507fc-f616-42e5-95bf-20bcaef11eb4
371249688-f8685f44-1850-476d-8c6e-861908d05aae
371250339-ade43091-739c-426e-9d87-0748b3f7a28c

Links to external sources

see also: https://github.com/mitchellkrogza/phishing/pull/488
https://draschool.org/M0YzWDRTNjM3VTMwN3M=
https://draschool.org/M2g1TjF0Mm0wbDNaMW8=

logs from uBlock Origin

N/A

Metadata

Metadata

Assignees

No one assigned

    Labels

    PhishingPhishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passw

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions