SAZKA SMShing Attack [EN]

Caught in the Easter Trap

SAZKA SMShing Attack [EN]

I recently came across a fairly well-made SMShing attack where the attackers faithfully mimicked the website of SAZKA, a Czech company mainly running number games and betting. The attackers took advantage of the company's advertising campaign promoting limited Easter scratch tickets and targeted the company's customers.

In this attack, the attackers sent an SMS message to the victim's phone containing a link to a website. In SMS victim was offered a free lottery ticket to celebrate Easter and the arrival of spring with a top prize of up to 2 million CZK, which is a classic baiting technique used by attackers to lure victims into clicking on links.

sms1
Delivered SMShing message

sms2
Detail of SMShing message

Once the victim clicked on the link, they were taken to a website that looked just like the legitimate SAZKA's website. The attackers were able to copy the website faithfully, which made it difficult for the victim to distinguish between the real and fake site. They even registered the look-alike domain sazka[.]pw.

main_page2
Fraudulent webpage

However, most of the links on the site led either to a fake payment gateway or a form requesting sensitive data such as an address. The fake payment gateway demanded payment of 1 CZK.

payment
Payment page

form
Shipping Information Form

What makes this attack even more interesting is that after the victim entered their card details, the fraudulent payment confirmation page was shown and asked for a confirmation code, which could come to the victim, for example, in a text message to their mobile phone. If the victim was using a code sent via SMS to confirm payments, attackers would be able to bypass this second payment confirmation factor.

confirmation
Payment confirmation

confirmation2
Payment confirmation code

Overall, this SMShing attack is an excellent example of how attackers are becoming more sophisticated in their techniques to deceive victims into divulging sensitive information. It is also an interesting coincidence that the victim who received the SMShing is indeed actively using the SAZKA websites. It is important to be aware of these types of attacks and to take precautions to protect your personal and financial information and verify the legitimacy of a website before accessing it or entering any data.