Cybercriminals Exploit Canadians’ Dependence on Digital Services in Widespread Attacks

Cybercriminals Exploit Canadians' Dependence on Digital Services in Widespread Attacks

Canadian citizens are facing a coordinated phishing campaign that leverages government impersonation and brand spoofing to harvest personal and financial data at scale.

The campaign is heavily aligned with PayTool, a known phishing-as-a-service ecosystem specializing in traffic violation scams targeting Canadians via SMS.

Beyond traffic fines, threat actors are impersonating Canada Revenue Agency (CRA), Air Canada, and Canada Post, signaling a broader, coordinated operation reusing common design templates and infrastructure.

Victims receive SMS messages and malicious advertisements using high-pressure tactics unpaid fines, failed deliveries, or booking errors. URLs leverage shorteners and typosquatted domains to appear legitimate.

Upon clicking, users enter a “fake validation” phase, requesting ticket numbers or booking references that accept any input value and perform no actual verification.

Security researchers at CloudSEK identified multiple fraud clusters exploiting traffic enforcement, tax refunds, airline bookings, and parcel delivery services all sectors where Canadians routinely exchange sensitive information online.

This trust-building step precedes a fraudulent payment gateway designed to harvest personally identifiable information (PII), banking credentials, and payment data.

The sophistication lies not in complexity but in psychological manipulation victims believe they are interacting with official services.

Infrastructure Analysis

Over 70 websites resolved to IP address 198.23.156.130, impersonating canada.ca as a “Traffic Ticket Search Portal – Government of Canada.”

Results showing multiple Canada.ca impersonating “Traffic Ticket Search Portal” domains hosted on shared infrastructure (Source : CloudSEK).

This federal-level framing reduces victim suspicion while allowing rapid scalability across provinces. Domain patterns show systematic naming conventions (ticket, traffic, portal, search, violation, infraction) indicating bulk automation rather than organic creation.

Province Observed Domains
British Columbia paytool-bc-2025[.]com, bc-infraction[.]com
Ontario ontarioticketpay[.]live, ontario-paytool-2025[.]com
Quebec ville-montreal-pay[.]com, amende-enligne-qc[.]com

The 45.156.87.0/24 subnet hosts payment phishing infrastructure, with key nodes at 45.156.87.145, 45.156.87.131, and 45.156.87.143.

When specific provincial domains are blacklisted, threat actors rotate traffic to generic fallback domains (parking-portal[.]live, overdueticketinfraction[.]info) to maintain campaign continuity.

Air Canada impersonation exploits typosquatting and SEO poisoning through character omission (aircanda-booking[.]com), duplication, and substitution.


Screenshot of the impersonated Air Canada landing page (Source : CloudSEK).
Screenshot of the impersonated Air Canada landing page (Source : CloudSEK).

These sites replicate favicon hashes and page titles from legitimate Air Canada infrastructure, intercepting users who mistype domains or click malicious ads.

Mitigations

Threat actor ‘theghostorder01’ actively sells phishing kits on dark web forums, advertising capability to harvest names, addresses, banking credentials, and Interac e-Transfer logins.

During the interaction, the seller was unable to demonstrate any server-side data handling or hosted infrastructure.

Threat actor impersonating the ontario driver license page, claiming it has 14 bank pages involved (Source : CloudSEK).
Threat actor impersonating the ontario driver license page, claiming it has 14 bank pages involved (Source : CloudSEK).

The actor facilitates sales via Telegram channels, accepting USDT (TRC-20) and Bitcoin payments.

When questioned about data capture infrastructure, the seller provided vague responses about email delivery.

This suggests minimal technical sophistication on the seller’s side, with buyers leveraging generative AI tools to script backend logic and real-time data exfiltration via APIs a capability requiring minimal technical skill.

Organizations must enforce proactive domain monitoring for keyword-based typosquatting and initiate rapid takedowns.

DNS and web gateways should block suspicious TLDs (.live, .info) and known PayTool IP ranges. Public awareness campaigns should emphasize that government agencies and airlines do not request sensitive data via SMS links.

Users should access services only through official bookmarked portals rather than links in messages or advertisements.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link