Jump to content

WHMCS Sites Spoofed


Humanbeing

Recommended Posts

Pretty much all WHMCS sites and their billing functions, ordering etc are being spoofed and proxied maliciously.

For example: https://www_whmcs_com.gamelaunch.goldwin.com/

To check if your site is also targetted, simply replace the first part in the URL with your domain.

What could be done to prevent this?

Edited by Humanbeing
Link to comment
Share on other sites

All whmcs functions (search, login, ordering, etc.) are being replicated in realtime on a malicious proxy site. How is that not a serious security concern? Not all customers can verify correct URLs in the address bar. Spoofing is when a URL mimics a legitimate website to deceive users into visiting fraudulent sites, often to steal login credentials or download malware.  A number of whmcs sites are affected. I provided whmcs's own website as an example. 

Edited by Humanbeing
Link to comment
Share on other sites

2 minutes ago, Damo said:

Report the parent domain to the abuse address of the network hosting it. Thats about all you can do. 
This is not specific to WHMCS sites and its poor form to suggest people put their own website address in to it. 

As stated above, whmcs sites are already actively copied and run by the offending server.  Putting your address hasn't got anything to do with it.

Link to comment
Share on other sites

15 minutes ago, Humanbeing said:

it copied our site and was hitting our server nonstop. 

That likely means it's setting it into an iframe, and not copying. 
To test, have a read here. I'd try the javascript version first (don't forget <script tags>) and see if it still loads. 

Link didn't paste: https://medium.com/@kesen.somar.99/securing-your-website-how-to-disable-iframes-to-prevent-click-hijacking-attacks-98cd2004720f

Edited by bear
Link to comment
Share on other sites

15 minutes ago, bear said:

That likely means it's setting it into an iframe, and not copying. 
To test, have a read here. I'd try the javascript version first (don't forget <script tags>) and see if it still loads. 

Link didn't paste: https://medium.com/@kesen.somar.99/securing-your-website-how-to-disable-iframes-to-prevent-click-hijacking-attacks-98cd2004720f

Thanks 🙂 Our x frame and CSP safeguards didn't stop that from happening though. This is what we had:

Content-Security-Policy "frame-ancestors 'self';
X-Frame-Options "SAMEORIGIN"

Do you think Stripe/paypal function on whmcs would break if we set: Content-Security-Policy: frame-src 'none'; and  
X-Frame-Options DENY

The below post says whmcs has built-in protections which clearly did not work: 

 

Edited by Humanbeing
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use & Guidelines and understand your posts will initially be pre-moderated