| Category: 
Adversary Intelligence | Industry: 
Underground | Motivation:
Financial | Region: 
Global | Source*: 
C - Fairly Reliable
4 - Doubtfully True | 
Executive Summary
| THREAT | IMPACT | MITIGATION | 
| 
 	New phishing-as-a-service platform named “Caffeine”, used to conduct phishing campaigns. | 
 	Equip malicious actors with details required to launch sophisticated ransomware attacks, exfiltrate data, and maintain persistence.Steal sensitive information such as PII and exploit them through social engineering attacks. | 
 	Implement a strong password policy.Enable MFA across logins.Check for anomalies in the endpoints or suspected login attempts. | 
Analysis and Attribution
Information from the Post
 	- CloudSEK’s contextual AI digital risk platform XVigil discovered a new phishing-as-a-service platform named “Caffeine.”
- The platform could be leveraged to launch phishing campaigns by opting for phishing services providing custom phishing kits.
- The platform mostly contains phishing templates customized to attack Russian and Chinese entities.
[caption id="attachment_21680" align="alignnone" width="652"]

 Login Page of the platform[/caption]
Caffeine Platform Analysis
 	- The platform is open to all and does not require any referral code to register.
- Upon registering on the platform, the threat actor can buy a subscription license which ranges depending on the operator and features:
 	- USD 250 for a month
- USD 450 for 3 months
- USD 850 for 6 months
 
- The platform also offers anti-detection and anti-analysis systems and customer support services along with the subscription, making it expensive as compared to other Phishing-as-a-service platforms.
- The platform also offered the following features apart from phishing services:
 	- Mechanisms for customizing dynamic URL schemes to help dynamically generate sites with victim-specific data already filled in
- Ultimate luring pages and first-stage redirect pages for campaigns.
- Geo-blocking, CIDR range-based blocking, and other IP blocklisting options
 
- At the time of writing this, the platform seems to be temporarily down due to maintenance issues.
[caption id="attachment_21681" align="alignnone" width="453"]

 Store under maintenance[/caption]
Caffeine Service Analysis
 	- CloudSEK researchers investigated the services available on the "Caffeine" platform and discovered that the threat actor was misusing an online service called - ongraphy[.]com which is a no-code SaaS platform to host websites or apps to launch teaching business websites.
- Similar SaaS services are quickly abused and adopted by other threat actors to host malicious pages.
- An old phishing page was hosted and disseminated via email ("eduardorodiguez9584.[ongraphy.]com")
Information from the Cybercrime forum
 	- The platform “Caffeine” emerged in October 2021 when the threat actor named “MRxCODER” advertised about the store and office365 sender.
- The threat actor also operates on telegram where regular updates and new tools from the platform are advertised.
- The video demonstration for the python spamming tools from the Caffeine platform was advertised on crax tube.
Information from OSINT
 	- The platform's Telegram channel promoted numerous bots and an Office 2FA cookies stealer. On the channel, the following were advertised:
 	- Caffeine Sender
- Caffeine Redirect
- OfficeTools FUD Telegram Bot
- Chase Bank KIT
- FUD Links Service
- Boa Kit
- Dubai Islamic Bank Kit
- Office 365 Cookies stealer
 
- The threat actor or Caffeine Store administrator surveyed on Telegram to inquire about the next phishing kit.
How can services offered be abused?
 	- Phishing kits for Chase Bank, Bank of America, and Dubai Islamic Bank are advertised on the service's Telegram channel, along with a service to make FUD phishing URLs that can be used to launch extensive phishing campaigns and attacks.
- Office 2FA cookie stealer can be used to steal 2FA cookies, victim's PII, and gather logs.
- Provides an email template for spamming customers and luring victims.
- The Ongraphy domain served as a redirect to a phishing page housed at a third-party domain that mimics the appearance of the official website for an Italian ophthalmologist's medical practice.
Threat Actor Activity and Rating
| Threat Actor Profiling | 
| Alias | MRxCODER | 
| Active since | 2021 | 
| Reputation | Medium | 
| Current Status | Active | 
| Telegram | t.me/caffeinestore_news [decent number of subscribers]
@mrxc0der
@mrxc0derii | 
| ICQ | https://icq.im/caffeine | 
| Crax Tube | https://crax.tube/@caffeinestore | 
| Underground Forum | https://www.nulled.to/user/1018926-mrxc0der | 
| History | Threat actor advertised about the Caffeine store and free carrier lookup bot | 
| Rating | C4 (C: Fairly Reliable; 4: Doubtfully True) | 
References
Appendix
[caption id="attachment_21682" align="alignnone" width="1254"]

 Advertisement on cybercrime forum[/caption]
[caption id="attachment_21683" align="alignnone" width="917"]

 Screenshot from the Telegram channel[/caption]
 
[caption id="attachment_21684" align="alignnone" width="896"]

 Telegram Channel[/caption]
 
[caption id="attachment_21685" align="alignnone" width="1716"]

 Dashboard of Caffeine[/caption]
[caption id="attachment_21686" align="alignnone" width="1688"]

 Dashboard of Caffeine[/caption]
[caption id="attachment_21687" align="alignnone" width="400"]

 Logo of Caffeine Store[/caption]