Fake landing pages are already a staple of cybercriminal trickery. Hackers have created have created hundreds of Netflix and Disney+ knockoffs in recent years. The BazaLoader group has made fake sites before, too, including a convincing impersonation of a lingerie retailer. But BravoMovies really does go above and beyond.

“We have not seen an entire fake streaming site created before,” says Sherrod DeGrippo, senior director of threat research and detection at Proofpoint. “This is a creative next level of social engineering.”

The details don’t always hold up to close scrutiny, but they give at least a light veneer of credibility to the enterprise. The BravoMovies homepage boasts of not only HD but “Full HD” and 4K streams. Its category offerings are familiar, even if the titles are decidedly not. It advertises mainstream perks like downloads for offline viewing and compatibility with a range of devices (including, confusingly, Blu-ray players).

To create convincing thumbnail posters of films, the attackers raided design-focused social network Behance for images, along with an advertising firm and a book called How to Steal a Dog. The results tilt toward the absurd, but honestly not much more so than what you might find at the bottom of your Netflix queue.

Screenshot: Proofpoint

To the extent that errors do jump out, well… maybe they do for you. “We’ve seen phishing pages that are built on free website builder sites and look like a child made them, and those are still successful,” says Hassold. “If someone has gotten to the point that they’ve made it to this landing page, the small spelling errors that most people would likely see and would raise a red flag are probably not going to move the needle very much.”

The scope of the campaign remains unclear, as does its ultimate goal. As a backdoor, BazaLoader acts as a sort of staging area for more purpose-built malware that comes later. Think of it as the Bifröst bridge of Norse/MCU legend, but offering passage for ransomware rather than surly Viking gods. whatever else rather than than a a path ransomware and whatever else are the Asgardians that actually make trouble. ProofPoint says it hasn’t detected whatever that second-stage malware is, but BazaLoader malware is closely linked to the group behind the notorious Trickbot malware.

The method also has its drawbacks. While it’s handy for getting around email protections, it’s easier to get people to click than to call. “Because it relies so much on
human interaction—that is, someone to actually pick up the phone and make a call—there is a lower likelihood of the recipient engaging with the threat actor,” says ProofPoint’s DeGrippo. She adds that the BazaLoader group typically sends tens of thousands of emails in a given campaign, with broad targeting across geographies and industries. 

Still, the fact that they put in so much time and effort indicates that despite the intricacies of the scheme, it must be working. “Criminals are inherently lazy,” says Hassold. “They’re going to do the least amount of work possible to make money.” There are more exciting heist plots out there. But points, at least, for originality.


More Great WIRED Stories

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

From Moonbreaker to Aliens: Dark Descent: PETER HOSKIN reveals his highlights from Gamescom 2022

Cologne – a city with one of the most vast, awe-inspiring cathedrals…

Self-driving cars could be on UK roads by 2026, says transport secretary

Mark Harper says vehicles can improve road safety and personal freedom, as…

What does UwU mean?

INTERNET and texting lingo has become so common, we find ourselves adapting…

Europe’s Plan to Beat Silicon Valley at Its Own Game

In 2001, the company lawyers had arranged a meeting with RIAA and…