This entry documents a live, multi-stage financial phishing and asset draining operation hosted on transient infrastructure (chilw-order.lat). The interface targets regional consumers of major Japanese classifieds and peer-to-peer marketplaces, specifically cloning the infrastructure of Jimoty (jmty.jp).



The Attack Vectors and Social Engineering Heuristics
The vector utilizes a sophisticated deployment of manufactured account urgency to neutralize user suspicion. The attack relies on three distinct technical phases embedded within a single dynamic web layout:
- Manufactured Account Restriction (KYC Baiting): Victims are routed to the page under the false pretext of an urgent security lock. The interface displays an official-looking “Account Restriction Notice,” claiming that compliance with Japan’s Financial Services Agency (FSA) regulations requires immediate verification. It displays pre-completed technical stages (such as email and phone validation) to establish a false baseline of trust.
- Balance-Targeted Extraction Mechanics: The core billing script requests not only full primary account numbers (PAN), expiration dates, and card verification values (CVV) but explicitly mandates the submission of the card’s exact current available balance in JPY. This field allows the threat actors to dynamically calibrate their backend merchant API requests to initiate a single-draw transaction optimized to completely drain the victim’s account parameters.
- Real-Time 2FA Bypass Framework: The backend system acts as an active reverse-proxy, processing input validation dynamically. It utilizes specific sub-interfaces to capture incoming SMS One-Time Passwords (3D Secure tokens) and instructs the victim to approve secondary mobile banking push notifications. Concurrently, the platform attempts device webcam activation under the guise of biometrical verification to defeat modern banking anti-fraud parameters.
Defensive Matrix Deployment
Due to the localized nature of the script, filters should deploy string-matching regex parameters targeting combinations of specific localized keywords like account restriction alerts combined with standardized unverified payment interfaces. The entity chilw-order.lat shows zero footprints of indexing or corporate legitimacy and should be systematically terminated across all routing proxies.













