A Phishing Attack Through Steam
Summary
Someone attempted to phish my Steam account credentials by sending me a cloned version of its legitimate website and requesting a quick favor. However, I recognized their intentions and decided to turn the tables by investigating their operation and uncovering their tactics and location.
Initial Encounter and Red Flags
I was logged into Steam and playing one of my favorite video games when I received a friend request from a stranger. I accepted the request 🤠 and here’s how our conversation began:

Up to this point, everything seemed legitimate, just a gamer stranger asking another gamer stranger, to vote for their creative endeavor.

When I first received the image, I thought to myself Wow, they must've done this so many times, some people didn’t know how to vote, so they had to highlight it in an image.
I copied the link, opened a private browser, and pasted it.

At first glance, and for someone who doesn’t interact with Steam interfaces very often, this might not raise any suspicions. However, for someone like me, the URL (https://steam.communityusersart.com/filedetails/sharedfiles/id=418496547/) immediately raised red flags.
The domain itself, communityusersart.com, has nothing to do with Steam. That alone was suspicious. To confirm, I Googled the domain name and found no relevant results, which is highly unusual for a company as big as Steam.
Analyzing the Suspicious Website
At this point, I was 100% certain I was being targeted by a phishing attack. Clicking on Vote as requested, prompted me to either Sign In or Cancel.

Compared to the real Steam website, when you click Vote you're prompted to either Sign In, create an account, or cancel.

Also, notice that the real website is in French, which matches my browser's language.
Additionally, on the fake website, the browser console, debugger and network are completely disabled.

That being said, I’m impressed by the technique used when I clicked the Sign In button.

What you see above is a JavaScript window created within the fake website itself, not a separate browser window. I can’t drag it out of the website, it’s confined to the page.
Next, I ran a Whois lookup on the domain to gather more information about the people behind it, including the country, registration dates, and other details.

The domain name is very new, having been registered on December 9th, 2024, and the registrant is based in Mauritania.
Establishing Trust and Empathy
Next, the threat actor moved to the next stage: establishing trust and empathy. They built a story to make the operation appear more legitimate, aiming to eliminate any doubts or suspicions.

After discovering that the registrant is from Mauritania, I wanted to verify that the person I was talking to was also from Mauritania. So, I moved on to the next stage: hacking the hacker.
Hacking the Hacker
I made sure to take a screenshot of an unexpected behavior from the threat actor's own website.

I then uploaded the screenshot to Imgur, used that link to create a new Grabify session, and finally shortened the Grabify link using Bit.ly. This is the final result:

This actually worked great, there's complete abstraction of the Grabify link.
Also, notice how the threat actor has moved to their next stage: closing the deal through urgency and pressure.
Now, all I have to do is wait for the phisher to get phished.
And voila!

Operational Security
So, at this point I’m somewhat certain that they’re using a VPN because the logs show that the IP originates from the US, while the domain name registrant is from Mauritania.
On top of that, the threat actor's English is quite limited, and when I pushed them to communicate outside their script, they either didn’t reply or made mistakes. It's also worth mentioning that the scammer's Steam profile claims they’re from the US, but this could be part of their OpSec.
All the online proxy-checking tools I tried indicate that this IP isn't a VPN, but I am still uncertain about this matter and the origin of this IP.
Domain Switch and Website Shutdown
As I’m writing this article, I attempted to access other subfolders and start digging into its requests, but to my surprise, the website is down, only an hour after it all occured. So, I tried pinging the domain to perform a DNS resolution and get the server's IP address: 185.100.157.50. I then input the IP into Shodan for quick results.

This is very strange, the domain name is different now. It was previously communityuserart.com, and now it's communitystudionsart.com.
Looking at its whois information on Whoxy, I discovered that it was registered on the same date as the other domain, and the registrant is also based in Mauritania.


Visiting the new website prompts a navigator alert warning me that it's a malicious and spam website.
My humble guess is that this is a fairly new operation. They currently have a single server but are actively rotating between multiple domain names.
Back From The Grave
So remember how I told you I activated Smart Logger and tried to pressure the scammer into clicking it again? Well, they didn’t.
BUT, two days later, they messaged me back, and of course, my next goal is still the same: get them to click the link.

And to my surprise, they clicked on the link again! not suspecting a thing?

For some reason, it doesn't show the information that Smart Logger typically provides, such as the timezone (even though I made sure it's enabled and functioning).
More importantly, the IP address changed, but it's still originating from the US. Along with the absence of timezone information, I began to suspect that the scammer might not have actually clicked the link. Instead, it could be the Steam client sending a GET request to fetch the website's metadata to display it nicely to the end-user.
Unfortunately, I later confirmed this by sending the link to a friend and asking them not to click on it. Sure enough, a different IP from the US appeared, using the same ISP and the same user agent.
But this isn’t over just yet. Look at this.

A new domain name! communityuserworks.com was also registered on December 9th, and the registrant is, once again, from Mauritania.
Conclusion
Researching this attack has been fascinating. I'm impressed by both their caution in avoiding the link and the sophistication of the Steam clone. However, it's troubling to realize that this is part of an ongoing operation involving multiple pre-registered domain names. So far, only one of the three domains has been flagged by my browser as fraudulent, meaning many people could still fall victim to this attack.
Finally, so I can sleep well, I reported the two unflagged domain names as fraudulent and reported the Steam user for scamming. Safe browsing everybody.
つづく
Last updated
Was this helpful?