This is certainly interesting. We have two kits on this domain

💸 elite bank[.]zip - AA419 scam (33.3MB)
🎟️ themeforest-ZzAltF1v-coopbank-banking-financial-credits-template.zip - Co-Op Credential Stealer kit (9MB) https://twitter.com/whale_it/status/1249598017960902657
The first kit called elite bank is a fraud kit used to defraud victims by creating fake banks and interacting with targets to steal large sums of money.

The kit is a copy and linked to
🌐 hxxps://elitepremierplc.com/index.html

Screenshot attached.
The kit is complex with many advanced features allowing for a victim to actually login to the fake website as part of the lure and many of links work on the site opposed to regular cred phishing where they usually only display a splash page.
The site also contains an admin portal for the cyber actors to access the database and view data from victims. This is not a credential stealing campaign; however, password reuse is a major concern due to victim targeting.
The main reason for the site is the lure victims into believing this is a real bank and the cyber actors instruct the victim to apply for a bank account by using the form. This is all part of building trust between them when, ultimately, they actor control the 'bank'
Once a victim has an account there is a number of things they can do on the account making it appear even more legitimate. The scam can now do a number of things. Usually the cyber actors will 'deposit' a large sum of money into the account and ask the victim to hold it for them.
The kit is well made, complex, and professional. Anyone who blames a victim for falling for these scams do not understand them. These cyber actors are scum and real world attribution will come.

This thread gets my Elite Premier Bank seal of approval
Hosting Information:

🌐/elitepremierplc.com (198.54.114.241) @Namecheap

🔐TLS by @SectigoHQ

@urlscanio Link https://urlscan.io/result/e41e7581-56a6-4b37-9dfe-56948a73eaaf
Second domain hosting information:

🌐/as-samirinternationalbank.net/elitefinal (198.54.125.205) @Namecheap

🔐TLS by @SectigoHQ

@urlscanio link: https://urlscan.io/result/fc77101c-79fd-47f8-bd6c-be47645004ed
Using a page hash pivot I've found another domain linked to the same scam

🌐/nisbankasi.com (31.22.4.145) @Wildcard_Net

@urlscanio link: https://urlscan.io/result/f72a5ee0-1cf5-4c16-996f-ce4f12276f0f/
The second kit on the domain is a standard credential phishing kit. It even comes with a useful setup guide. This is a demonstration of how professional the phishing as a service economy has become. 👎
You can follow @JCyberSec_.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: