LINE Phishing Scam steals your SMS authentication code

ozuma5119 / Yusuke Osumi
4 min readMar 7, 2020

--

LINE is a messaging app and widely used in Asia. Especially in Japan, it’s the most popular messaging app.

Quote: https://line.me/ja/ (LINE Corp.)

Unfortunately, the largest market share means many criminals want to thief accounts. Now LINE suffers from Phishing Sites.

In this article, I show a Phishing Site of LINE and how it works.

There are some actors of LINE Phishing Scam. Their Phishing Websites are different — this means they have a different PhishKit.

Phishing Websites of LINE

Method to make victims access Phishing Sites

Phishing Mail

LINE Phishing scammers send characteristic Phishing mails, “[LINE緊急問題]”(LINE Emergency Problem).

Phishing Mail [LINE緊急問題]

They say “お客様のLINEアカウントに異常ログインされたことがありました。” (There was an abnormal login to your LINE account.) and lead to Phishing Link. Of course, link text is tampered by <a> element.

Phishing Link has a tracking token, but Phishing Sites work without this token.

Phishing Talk

LINE is a messaging app, so “Talk” is a strong method to make victims access a Phishing Site.

Once Phishers get victim’s account, they sometimes “Talk” to Friends including a Phishing Site’s URL.

There are some types of LINE Account, (1) normal account and (2) LINE@ account. (2) is used by Shop/Organisation/Company to announce something. Therefore, when LINE@ account is compromised, it leads to giant “Phishing Talk”.

On Feb. 13th 2020, LINE@ account of Men’s cosmetics brand HMENZ was compromised and “Talk” a Phishing URL with luring message.

Compromised LINE@ account

Real Man-in-the-Middle

Before showing how LINE Phishing Website works, I explain a whole system.

Phishing Diagram

The most important point is they steal not only ID/password, but also OTP(OneTimePassword) by using a method of Man-in-the-Middle. So 2FA with SMS authentication code is useless.

We must understand that MFA with simple string OTP is helpless for Phishing and Social Engineering.

How it works?

Then let’s see a “real” Phishing Site and how it works.

Phishing Site: step 1

At 1st, they steal ID/password, i.e. E-mail address and password. Now Phishers get 1st credential.

Next, Phishers urge victims to input Phone Number.

Phishing Site: step 2

Now Phishers are ready! They start LINE app with their SmartPhone, and wait a Victim’s SMS AuthCode.

SMS Authentication Code for login

If a poor victim input SMS Authentication Code to the Phishing Site, Phishers can login.

One more thing…

LINE has complex login system to cope with user’s upgrading to a new mobile phone. So Phishers need another OTP, Transfer Verification Code.

But this is easy: Phishers use the same way. They urge victims to input that.

Phishing Site: step 3

Transfer Verification Code is also sent by SMS. Poor victims input the code to the Phishing Site…

Transfer Verification Code for login (sent by SMS)

Then that’s all! Phishers completely compromise victim’s account.

Other Phishing with the same way

In these days, Japanese banks are also suffering from Phishing sites.

Phishing Site of the Japan Net Bank. Phishers show an input box for OTP.

Of course they provide OTP — SMS-based, hardware token-based, SmartPhone app-based, and so on. But Phishers’ way is the same. They wait for input of OTP behind a Phishing Site, and login to Bank account.

LINE’s announcement

LINE announced these ways in detail (LINEへの不正ログインに対する注意喚起). They also announced how many accounts were compromised —I think this is really honourable.

LINE Corp. has Transparency Report, so this announcement meets the needs.

Conclusion

  • MFA(Multi-Factor Authentication) is important to protect your account, but simple string OTP is helpless for the MITM(Man-in-the-Middle) attack such as Phishing Sites.
  • Don’t click/tap URL in SMS/e-mail. You should think “Is this a trap?” every time.

Acknowledgments

--

--

ozuma5119 / Yusuke Osumi
ozuma5119 / Yusuke Osumi

Written by ozuma5119 / Yusuke Osumi

CSIRT, Cyber Security Researcher, PenTester. CISSP/CISA

No responses yet