Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Alerts»Article: Fake-Game: The Emergence of a Phishing-as-a-Service Platform
    Alerts

    Article: Fake-Game: The Emergence of a Phishing-as-a-Service Platform

    By Gerald Johnson Jr.September 8, 20164 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    “Malware-as-a-Service (MaaS) business models continue to thrive in the cyber underground. It has allowed cyber crooks to generate renewable income through renting malware rather than selling their tool for a one-time payment. As a result, the business model has been adopted in various underground commodities such as exploit kits andremote access trojans. Recently, we saw the emergence of Ransomware-as-a-Service (RaaS) platforms.

    During our monitoring, we discovered that this same business model is also being used in phishing schemes in the form of a Russian website called “Fake-Game.” Appearing in (at least) July 2015, Fake-Game offers a Phishing-as-a-Service (PHaaS) platform to anyone who signs up on their website:

    Once a user has logged in, a tutorial window pops-up (the rest of the images in this post have been translated from Russian to English to allow our general readers to understand them):

    The site then asks the user to choose which type of credential it wishes to steal:

    To see how it works, we tried to simulate the platform’s Gmail phishing tool. Upon choosing the Google option from the dropdown menu above, a link containing the subdomain “gmail” was generated:

    The link is appended by an affiliate ID which, in this case, is our subscriber’s ID. This allows the website to track which stolen accounts belong to which subscriber.

    A subscriber can then spread the phishing site to prospective victims. Once a victim enters a credential into the subscriber’s phishing link, a prompt showing the stolen information appears:

    In order to assist novice cyber criminals using the platform, the above prompt provides a hyperlink to another Russian site where subscribers can sell the credentials they have stolen. The stolen credentials can be sold from $0.015 USD up to $15.39 USD at current exchange rates.

    A summary of stolen credentials appear on the subscriber’s profile:

    How Does the Phishing Webpage Work?

    The Gmail phishing page looks like the legitimate Gmail log in page:

    The Fake-Game platform has a feature that verifies the validity of credentials. If an entered credential is valid, it replies with a compressed string that translates to “good” once decompressed:

    The phishing page’s code then checks to see if Fake-Game responded with the required value. If not, it displays an error and re-loads the phishing page:

    The Fake-Game Phishing-as-a-Service (PHaaS) Business Model

    Fake-Game earns money by offering VIP subscriptions for relatively low prices. The VIP account also offers subscribers extra privileges (listed below) that are not available for normal one-time users. The prices for such an account are $3.50 USD for a month, $5.70 USD for two months and $7.12 USD for three months:

    Like legitimate businesses, Fake-Game has a real-time chat support feature available on its website:

    Users are also given the privilege to chat with each other after reaching a rating of over 50 on the website:

    User ratings are achieved by purchasing VIP accounts. Higher VIP package purchases reward users with higher ratings.

    In addition, referral programs are available in order to attract more users to use the PHaaS platform:

    As of this writing, the Fake-Game website shows that there are currently 61,269 subscribers using the platform. Furthermore, a total of 679,511 credentials were stolen based on their current statistics:

    Conclusion

    With the thriving malware-as-a-service business model, it is unsurprising to see the emergence of a Phishing-as-a-Service platform such as Fake-Game. However, it is important to be aware of these services and understand their implications. In this case, an effective business model such as this has the capability to amplify phishing attacks in the wild by making malicious services available and convenient to just about anyone.

    While Fake-Game caters specifically to Russian cyber criminals, we believe that similar services will be available to other regions soon, if they are not already happening.

    We want to reemphasize that it is always a good idea to make sure that the website link on your browser address bar is legitimate before entering online credentials. If you are unsure, manually typing in the correct website URL can help prevent phishing attacks. Furthermore, remember that unsolicited requests for credentials arriving through email or social media are typically fraudulent, and are best avoided.”

    Source: https://blog.fortinet.com/2016/08/31/fake-game-the-emergence-of-a-phishing-as-a-service-platform

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleArticle: Update OS X Right Now or You Could Get Some Nasty Spyware
    Next Article Article: 500 Million Yahoo Accounts Stolen

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Cybersecurity Alert: Risks of Abandoned Websites

    What You Need to Know About Emerging Data Privacy Trends in 2025

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d