Jump to content

Unusual order activity


Recommended Posts

It's few days I'm experiencing a strange malicious activity, that is the registration of several fake accounts with the following characteristics:

  • all of them use no-existing email addresses, but existing domains ( @palestinedrinks.com, @docomo.ne.jp, @yahoo.com, @aol.com)
  • all of them came from USA IP
  • all of them use plausible US names and addresses
  • they came from different IP, but often belonging to the same IP class (i.e. I blocked 84.32.60.0/24 and 104.165.169.0/24)
  • many (or maybe all of them) after the registration try a password reset (which can't work because they're using a non-existent email account)

Not a huge number: just a dozen of them in two days...

Anyone experiencing the same issue?
Anyone having any idea about the goal of such activity?

Link to comment
Share on other sites

If they know the email won't arrive, that's puzzling. I will say it's likely they're looking at the transaction in real time to see if anything's revealed there. Brings to mind the 2013 issue with AES encrypt spitting out admin details when a carefully crafted name change was used. Not saying it's that, but concerning it's similar.

Link to comment
Share on other sites

We’re having the exact same issue with the same users as you’ve listed. 
 

We’ve removed the ability to register without ordering and now we’re getting fake orders too. It seems they create an account and then immediately request a password reset. 

Link to comment
Share on other sites

The activity is slowly going on... every few hours, a new fake account is created.

After the banning of the domains used for emails, "generic" email domains are used (@gmail.com, @msn.com, @icloud.com, yahoo.com)

just for reference, I report here the full list of IP used:


84.32.60.0/24
104.165.169.0/24
156.239.55.38      
45.146.203.224        
5.102.101.151        
104.234.211.171        
104.165.127.0/24        
23.230.167.30        
140.99.127.42           
23.27.240.208

Link to comment
Share on other sites

Posted (edited)

Yes, I have noticed this as well - Last 48 hours or so.. Here is my list of banned IP's so far.

5.102.101.38
5.102.101.71
5.102.101.84
23.230.167.19
31.6.43.23
31.6.46.13
45.146.203.74
45.146.203.158
84.32.64.46
84.32.64.65
104.165.127.74
104.165.127.251
104.165.169.110
104.165.169.160
104.165.169.247
104.252.131.65
104.252.131.87
140.99.127.90
140.99.127.120
156.239.50.89
172.121.142.117
 

Many of these match with your list - and I have the exact same issue - Fake signups, with real looking details. (and a few reset password attempts to I just discovered!) I have been Deleting the client as soon as they arrive (they are not even attempting payment - so its an easy thing for me to manage).

Very strange.

Edited by slim
Link to comment
Share on other sites

A good portion of the IPs are from Emeigh Investments LLC. A quick search finds this:
https://securityboulevard.com/2022/05/state-of-api-security-activity/

Basically as I'd mentioned, bad actors are checking the website programming looking for flaws to exploit. With WHMCS containing user info along with monetary info, it's a good target. Add to that the simple way to "Google Dork" the sites running it (powered by tagline, generally), not too hard to find potential victims. They find a way in, it's gold. 

Link to comment
Share on other sites

While I agree, the fact it’s just started and has a pattern, I’d say they know something new. If it was bad actors generally looking for exploits we would have seen it before now.

Link to comment
Share on other sites

8 minutes ago, slim said:

While I agree, the fact it’s just started and has a pattern, I’d say they know something new. If it was bad actors generally looking for exploits we would have seen it before now.

I didn't want to jump too far ahead. Entirely possible it's not new overall, it just took time to reach your site(s). I find it more likely they are fishing for an exploitable reaction from the software, since it's a repeated thing on each site, and not a very specific request to one. If they "knew something", why keep trying on the same site? It would work or not, I'd guess. Since it's a pass reset that follows creation, maybe they found something in general in other resets (other software) that they think may have been used here. 

If it were me, I'd buy a license and test with that (or even grab a pirated one, which exposes the code (kinda). Doing this to various public installations only calls attention to it. 

Link to comment
Share on other sites

19 hours ago, Remitur said:

often belonging to the same IP class (i.e. I blocked 84.32.60.0/24 and 104.165.169.0/24)

A quick search shows they're assigned to sprious.com. One of the items offered there is "Scraping Robot
Top-tier scraping paired with competitive pricing to help elevate your company"

Just an FYI. I'd guess they used that to find potential victims and then took the results to attempt exploits. There are cheaper ways with a lot less "noise" and traceability, so they don't seem terribly "ready to exploit" to me. Could be wrong. 

Link to comment
Share on other sites

We have been a WHMCS user since 2007 and firm based in South Africa.

Since 48 hours we are the same victim of a distributed, apparently automated, drip campaign denial of service attack on our system.

At first, random registrations, sometimes with a known address, and then without.

We changed the setting no more registrations without buying a product.

Then the tack changed straight after, now ordering products.

We turned on different captchas on all parts of the system. No difference.

I have reach out to WHMCS to get their official stance. It appears that some of these attacks are automated.


- At first, just new registrations, drip.
- Then we change the setting to only allow registration with prior order.
- Then the tact changed to order products, drip orders.
- To be specific, random domain names, .COMs mostly, and random USA addresses.

We exported the orders table, and all IPs are random:

 

45.146.203.242
31.6.43.209
104.165.127.6
5.102.101.110
45.146.203.230
23.230.167.171
104.164.183.249
5.102.101.211
140.99.127.132
156.239.52.118
84.32.64.198
104.165.127.96
84.32.64.248
31.6.43.137
104.165.169.24
104.165.169.90
23.230.167.244
45.146.203.140
31.6.26.243
104.164.183.70
166.88.122.76
84.32.64.188
172.121.142.159
23.27.240.193
84.32.64.132
Link to comment
Share on other sites

I was just contacted by another WHMCS user, who reported the same issue.

here his message (slightly different behaviour from the bad guy) and his IP list (some of them are already in my own list, and already blacklisted).

Quote

Since 48 hours we are the same victim of a distributed, apparently automated, drip campaign denial of service attack on our system.

I have reach out to WHMCS to get their official stance. It's clear that some of these attacks are automated.
At first, just new registration.
Then we change the setting to only allow registration with prior order.
Then the tact changed to order products.
To be specific, random domain names, .COMs mostly, and random USA adresses.

We exported the orders table, and all IPs are random:

 

45.146.203.242
31.6.43.209
104.165.127.6
5.102.101.110
45.146.203.230
23.230.167.171
104.164.183.249
5.102.101.211
140.99.127.132
156.239.52.118
84.32.64.198
104.165.127.96
84.32.64.248
31.6.43.137
104.165.169.24
104.165.169.90
23.230.167.244
45.146.203.140
31.6.26.243
104.164.183.70
166.88.122.76
84.32.64.188
172.121.142.159
23.27.240.193
84.32.64.132

 

Link to comment
Share on other sites

  • WHMCS Technical Analyst

HI @Remitur

We are aware of reports of unusual orders being placed, potentially in an automated way and are tracking this internally.

There are some immediate steps which you can take to help minimise the impact of automated orders :

First of all, please make sure that "Allow Client Registration" is disabled at System Settings > General Settings > Other (tab) , as this provides an easy way for spammers to create accounts without needing to place an order.

Secondly, please make sure that you have enabled "Invisible reCAPTCHA" under "Captcha Type" at System Settings > General Settings > Security (tab) . This is the most secure captcha that is currently integrated with WHMCS.

Next, please make sure that you follow and implement all of the solutions provided in our documentation:
https://docs.whmcs.com/orders/spam-orders/

Importantly, please make sure that you have implemented a Web Application Firewall and gone through the full configuration process. Whilst we don't recommend any particular provider, the following are some of the most popular:
CloudFlare: https://www.cloudflare.com/
Amazon CloudFront: https://aws.amazon.com/cloudfront/
Incapulsa: https://www.incapsula.com/
KeyCDN: https://www.keycdn.com/

We are looking into whether these spam orders are being created by submitting a modified POST request to WHMCS. If that is the case, implementing a well-tuned WAF should mitigate much of the problem.

Link to comment
Share on other sites

As a guess, they're submitting orders directly to the system via specially crafted POST requests. Kind of like when a contact form allows direct submission, and doesn't make sure the POST came via the expected source page. Just a guess. If, however, it's not checking source and these get through, that can be a rather alarming flaw, but stating this should be handled at the WAF level is a bit more concerning.... 

Link to comment
Share on other sites

Here is an example of them posting: 

cat access_log | grep 104.234.211.39
104.234.211.39 - - [05/Jul/2024:04:59:17 +0200] "GET /register.php HTTP/1.1" 200 6166 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
104.234.211.39 - - [05/Jul/2024:04:59:18 +0200] "GET /cart.php?a=add&domain=register HTTP/1.1" 200 43126 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
104.234.211.39 - - [05/Jul/2024:04:59:20 +0200] "POST /cart.php HTTP/1.1" 200 54 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
104.234.211.39 - - [05/Jul/2024:04:59:21 +0200] "GET /cart.php?a=checkout&e=false HTTP/1.1" 200 20463 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
104.234.211.39 - - [05/Jul/2024:05:01:30 +0200] "POST /cart.php?a=checkout HTTP/1.1" 302 356 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
104.234.211.39 - - [05/Jul/2024:05:01:31 +0200] "GET /cart.php?a=fraudcheck HTTP/1.1" 200 7115 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"

Check the times. Register, one second later, add to cart, one  second last post to register again? Then one scond later checkout, then 2 minutes later POST to cart.

 

Link to comment
Share on other sites

Here is another one, 17 minutes later. Again, see referrer of register.php, seems they use something on this page to do the rest:

 

cat access_log | grep 5.102.101.157
5.102.101.157 - - [05/Jul/2024:05:17:21 +0200] "GET /register.php HTTP/1.1" 200 6168 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
5.102.101.157 - - [05/Jul/2024:05:17:22 +0200] "GET /cart.php?a=add&domain=register HTTP/1.1" 200 43142 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
5.102.101.157 - - [05/Jul/2024:05:17:23 +0200] "POST /cart.php HTTP/1.1" 200 54 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
5.102.101.157 - - [05/Jul/2024:05:17:24 +0200] "GET /cart.php?a=checkout&e=false HTTP/1.1" 200 20441 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
5.102.101.157 - - [05/Jul/2024:05:17:55 +0200] "POST /cart.php?a=checkout HTTP/1.1" 302 356 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"
5.102.101.157 - - [05/Jul/2024:05:17:55 +0200] "GET /cart.php?a=fraudcheck HTTP/1.1" 200 7110 "https://portal.example.com/register.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0"

 

Link to comment
Share on other sites

  • WHMCS Support Manager
13 hours ago, slim said:

What  is this ‘known issue’ you refer to?

We have received reports of such orders from users and are tracking these reports internally.

If there is some kind of change we can potentially make in future to help in this respect, it's certainly something we want to be aware of.

Link to comment
Share on other sites

I greatly reduced the number of fake registrations blacklisting following IP classes:

84.32.64.0/24
172.121.142.0/24 
104.165.169.0/24 
31.6.46.0/24 
31.6.43.0/24 
104.165.127.0/24 
45.146.203.0/24 
5.102.101.0/24 
140.99.127.0/24 
156.239.52.0/24 
23.230.167.0/24 
104.164.183.0/24 
23.27.240.0/24
192.142.242.0/24
192.142.240.0/24
192.142.243.0/24
192.142.244.0/24
192.142.245.0/24

 

Link to comment
Share on other sites

Assuming this won't continue for ever.... weeks or months, we implement this:

<IfModule mod_rewrite.c>
    RewriteEngine On

    # Check if the User-Agent matches
    RewriteCond %{HTTP_USER_AGENT} "Mozilla/5.0 \(Windows NT 10.0; Win64; x64; rv:127.0\) Gecko/20100101 Firefox/127.0"

    # Check if the request method is POST
    RewriteCond %{REQUEST_METHOD} POST

    # Check if the URL is register.php
    RewriteCond %{REQUEST_URI} register.php$

    # Deny access by returning a 403 Forbidden status
    RewriteRule .* - [F]
</IfModule>

 

The agent is always the same, so we block it on web server layer. 

Hope it helps.

Link to comment
Share on other sites

6 hours ago, chrismfz said:
"Mozilla/5.0 \(Windows NT 10.0; Win64; x64; rv:127.0\) Gecko/20100101 Firefox/127.0"

Though this may stop them because they're using it, so am I when using Firefox. Assuming POSTing to register.php is part of the normal register/order process, this will disallow anyone using the latest version of FF to register. 

Link to comment
Share on other sites

54 minutes ago, chrismfz said:

It stops POSTs, on register.php when seeing this Firefox agent. Nothing else. only for register.php and only when someone will try to POST something. 

It did the job for us. 

It’s worked for us too. Thank you 🙏 

Link to comment
Share on other sites

  • WHMCS John changed the title to Unusual order activity

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use & Guidelines and understand your posts will initially be pre-moderated