[Brand Impersonation] - Bank of Ireland
Bank of Ireland Group is one of the largest financial services groups in Ireland and provides a broad range of banking and other financial services.
During our PreCrime internet scout of December 14th 2022 we identified suspicious markers across multiple vectors. One of those was this website spoof that could be targeting unsuspecting users of Bank of Ireland.
Legitimate site :
Malicious domain created on December 13, 2022, identified by Bfore.Ai on December 14, 2022
This attack shows a brand impersonation attack on one of the biggest banks in Ireland, Bank of Ireland (BOI).
How does this attack work ?
The URL leads users to an almost exact clone of the legitimate sites login page, where they are asked to login to their BOI account using their User ID, Date of Birth and Phone Number. On the legitimate login page, BOI users are only asked to enter User ID and Date of Birth to login to their account.
How do they trick users into believing the attack is real?
Users may be led to the malicious website through a phishing campaign, wherein they are asked to go to the website in order to verify their account by logging in due an issue. The threat actors will likely attempt to convince users that this is an urgent matter, a tactic often used to make victims feel a sense of urgency and thereby more likely to comply.
Copying the branding from BOI including using the same logo, colours and font. Additionally, the login page is almost identical to the legitimate login website.
Using a domain name similar to BOI. The threat actors have used the acronym version of the bank, BOI.
Why is this a threat ?
If successful, this attack would provide threat actors with access to sensitive personal information about the individual or corporate user, allowing threat actors to take control of their bank account and steal their money. Corporations using BOI would also be at risk of their internal network being compromised, if their credentials used at BOI correspond to those they use for work.
Domain brand impersonation does not just lead to theft of sensitive personal information, but could also result in malware infection for both private consumers and global corporations depending on the target and end goal of the threat actor. This occurs when stolen credentials are sold on the dark web, giving other threat actors the ability to conduct further attacks against the user(s) such as ransomware attacks. Such attacks could pose serious consequences for the company, including high monetary costs, disrupting business operations, exposure of confidential data and reputational damage.
A cyber incident of BOI could ultimately result in the loss of around 14,8 million EUR.
Companies connected to BOI could run the risk of a data breach which as of 2022 could result in the loss of around 4 million EUR.
If individual consumers were to become a victim of this attempt to gain their personal information over the internet, they could lose between 2-3 thousand EUR.
If in doubt whether an email is legitimate, never click on any links. Go to the legitimate website’s domain instead via a search engine.
Always double check the domain name to make sure it is the legitimate one.
Never use the same credentials for work and personal accounts.
Use different passwords for online banking and shopping sites, for example, so if one of your accounts becomes compromised your other accounts will remain safe.
Incorporate Multi Factor Authentication where possible to keep your accounts safe even if the credentials are compromised.
Identification and threat analysis
The technical report below helps emphasize the differences in terms of DNS records between the malicious domain, and the legitimate domain.
The Governor and Company of Bank of Ireland
1 day old
Created 13 December 2022
9,276 days old
Created on 22 July 1997
Issued by: Let's Encrypt
Issued to: *.boi-online.info
03-12-2022 -> 03-03-2023
Valid for 3 months
Issued by: QuoVadis Limited
Issued to: Bank of Ireland
13-01-2022 -> 13-01-2023
Valid for 1 year
Last seen active
13 December 2022
13 December 2022
Toronto, Ontario, Canada
AS13335 Cloudflare, Inc.
ISP: Cloudflare, Inc.
Organisation: Cloudflare, Inc.
New York, United States
AS22612 Namecheap, Inc.
AS135905 VIETNAM POSTS AND TELECOMMUNICATIONS GROUP
Organisation: iNET Media Company Limited
Dublin, Leinster, Ireland
AS41678 The Internet Business Ltd
ISP: The Internet Business Ltd
Organisation: BOI Dedicated
New York, New York
AS55002 Defense.Net, Inc
ISP: Defense.Net, Inc
Organisation: Defense.Net, Inc
How Bfore.Ai is protecting our customers
At Bfore.Ai, we work daily to ensure these phishing attacks get stopped before even reaching their targets. We are here to make your internet journey safer than it has ever been.
With more than 30K new malicious indicators per day we got you covered no matter where the attack comes from. Only 0.05% false positive rate, stop wasting time in false alerts chasing. By launching our PreCrime and PreEmpt technologies, we measure our anticipation from an attack starting, faster than attackers.
Accepting that the only defense is good detection, is accepting to be forever a victim. We believe in prevention more than response. Visit our website for more information !
This document and its contents do not constitute, and are not a substitute for, legal advice. The outcome of a Security Risk Assessment should be utilized to ensure that diligent measures are taken to lower the risk of potential weaknesses be exploited to compromise data.
Although the Services and this report may provide data that Client can use in its compliance efforts, Client (not Bfore.Ai) is ultimately responsible for assessing and meeting Client's own compliance responsibilities. This report does not constitute a guarantee or assurance of Client's compliance with any law, regulation or standard.