16shop has been enabling tons of attacks against the customers of high-profile companies since 2018. The good news is that last month, law enforcers nabbed two of its alleged operators in Indonesia and Japan.1
We couldn’t help but wonder, though, if the arrests mean the end for the phishing kit. To find out, the TIP researchers expanded the list of published indicators of compromise (IoCs)2 to identify other web properties that could put users at risk. Our DNS deep dive led to the discovery of:
- Five unreported IP addresses to which four of the domains identified as IoCs resolved, two of which are currently detected by various engines as malware hosts
- 30 domains hosted on connected IP addresses, one of which is classified as malicious based on a bulk malware check
- 18,688 domains containing the brand names being abused in the campaigns Trend Micro analyzed, 337 of which are already considered malicious based on a bulk malware check
Download a sample of the threat research materials now or contact us to access the complete set of research materials.
-  https://www.trendmicro.com/en_us/research/23/i/revisiting-16shop-phishing-kit-trend-interpol-partnership.html
-  https://otx.alienvault.com/pulse/64f6d5bc3226451dfc4ea8eb