Phishing Attempt via Text Message
Today, I received this text message that is obviously a phishing attempt:

I was curious, so I went ahead and checked out the site. It was a mediocre attempt at recreating the actual site.

I opened my browser’s dev tools to capture network activity. Then I submitted some made up credentials. Unsurprisingly, they didn’t work:

In the dev tools, I checked the headers tab to see that the requests were actually going to https://toys-store.site/citi.php:

I could also see my credentials in the payload:

With this information, I could create a Python script to flood the scammers with fake credentials. This way, they won’t know what credentials are valid when using them themselves.
Creating a Python Script
My plan was to create a loop that would continuously send POST requests to the scammer site.
I wanted to speed up the amount of POST requests I could send at a time. I came across the
multiprocessing package that could help me with that.
I also planned on using
Faker to dynamically generate credentials.
I came up with the following code:
| |
fake.simple_profile() from the payload dictionary generates a dictionary containing user information. I am only using the username portion in this case.
| |
I ran the script and left it running for a while. The time being printed out is extracted from the response headers. This way I could easily see requests as they’re being sent in the CLI:

It’s not easy to tell in a screenshot, but with the multiprocessing package I was able to speed up the process of sending post requests. My terminal was filling up pretty quickly.
I hope I made the scammers’ lives more difficult as a result of this. I also reported the domains being used so that they are hopefully flagged by browsers in the future.
If you enjoyed this, I previously did something similar to mess with some MetaMask scammers: Retaliating Against MetaMask Scammers With Python.