Scams & Phishing News Beware of Fake Traffic Ticket Portals that Harvest Your PII and Credit Card Data

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,061
14,261
6,069
A sophisticated phishing campaign targeting Canadian citizens has emerged, using fake traffic ticket payment portals to steal personal and financial information.

The scam begins when individuals receive text messages or encounter malicious advertisements claiming they have unpaid traffic fines.

The fake websites mimic the appearance of legitimate government platforms, complete with provincial logos and official-looking designs that build trust and credibility.

I had one few months ago.
SMS asking to visit website to pay a traffic ticket.
Used PC, not phone, to open the link.
Redirected to a website identical to the official one, even the domain is well-crafted and raises no suspicion.
Not blocked by ControlD DNS, SmartScreen, Symantec browser protection, Norton safe web, McAfee web advisor, nor Avast web shield.
The only thing that make me suspect, the SMS did not contain the car registration number.
 
Last edited by a moderator:
Technical Analysis & Remediation

MITRE ATT&CK Mapping

Initial Access

T1190 (Exploit Public-Facing Application - SEO Poisoning)

Resource Development
T1583.001 (Acquire Infrastructure: Domains)

Collection
T1189 (Drive-by Compromise)
T1056.001 (Keylogging/Input Capture)

Command and Control
T1071.001 (Web Protocols)

Threat Profile & Campaign Telemetry

Target Scope

Canadian Provinces (ON, AB, BC, MB, SK, QC).

Kit Behavior
The phishing kit features a "fake validation" phase that accepts any ticket number to build trust before requesting payment. It utilizes a "waiting room" tactic where the browser polls a backend to hold the victim while the attacker manually triggers redirects (e.g., to SMS interception pages).

Live Evidence Extraction

Network Anchor

45.156.87.0/24 (Identified hosting subnet for the phishing infrastructure).

Backend Controller
../ipanel/inc/action.php (Data exfiltration endpoint).

Keep-Alive Mechanism
status.php?type=getstatus (Polling beacon).

Domain Patterns
High frequency of terms: "ticket", "traffic", "portal", "violation".

Remediation - THE ENTERPRISE TRACK (SANS PICERL)

Phase 1: Identification & Containment

Network Block

Immediately block traffic to the subnet 45.156.87.0/24 at the perimeter firewall and web gateway (SWG).

DNS Filtering
Sinkhole domains matching the regex pattern .*(ticket|traffic|portal|violation).*\.(com|live|net) originating from the identified subnet.

Log Review
Query SIEM for HTTP Referer headers containing "search" (Google/Bing) followed by outbound connections to uncategorized/newly registered domains.

Phase 2: Eradication

Email Purge

If SMS lures were bridged to corporate email (e.g., via SMS-to-Email gateways), search and purge messages containing "unpaid fine" or "traffic violation".

Endpoint Sweep
Scan for browser history artifacts accessing the malicious domains to identify impacted users.

Phase 3: Recovery

Credential Reset

For any user identified as visiting the sites, force a password reset and reissue corporate credit cards if entered.

Validation
Verify no further beacons to ipanel/inc/action.php are occurring.

Phase 4: Lessons Learned

Detection Engineering

Create a rule for high-frequency POST requests to generic PHP files (action.php, status.php) on non-reputation domains.

Remediation - THE HOME USER TRACK

Priority 1: Safety (Stop the Bleeding)

Disconnect

If you are currently on such a site, close the browser immediately. Do not enter any information.

Verification
Official government sites usually end in .gov.ca, .on.ca, etc. Verify the URL manually. The malicious sites often accept any random ticket number, legitimate sites will reject invalid numbers.

Priority 2: Identity & Financials

Card Cancellation

If you entered credit card data, contact your bank immediately to cancel the card and dispute pending charges.

Credit Monitoring
Enable transaction alerts on your banking apps. Consider placing a fraud alert on your credit file (Equifax/TransUnion).

Priority 3: Persistence

Browser Cleanup

Clear your browser cache and cookies to remove any session tokens or tracking scripts left by the phishing kit.

Hardening & References

Baseline (CIS)

Controls 7 (Enterprise Browser Protections) & 9 (Email/Web Browser Protections).

Tactical Reference
Unit 42: "SEO Poisoning Campaign Pushing Fake Traffic Ticket Portals".

CloudSEK
"Pivoting From PayTool: Tracking Various Frauds" (identifying the 45.156.87.0/24 subnet).

Indicators
Look for "waiting room" code loops in page source (status.php polling).

Sources

Cyber Security News

CloudSEK (Technical Report)

Unit 42 (Palo Alto Networks)
 

You may also like...