Kash Patel’s personal merch site hacked to trick users into installing malware

0
Kash Patel’s personal merch site hacked to trick users into installing malware

FBI Director Kash Patel’s personal merchandise site went offline Friday after a hack apparently tricked visitors into downloading malware.

The site — unprecedented for an FBI chief — sells “K$H”-branded patriotic goods, such as clothing and books. The site, known as Based Apparel, has offered “Love It Or Leave It” T-shirts for $35, “Government Gangster” playing cards for $10 and a “Fight with K$H” scarf for $25.

It also sells a line of children’s books.

This week, visitors to the website were met with a Cloudflare verification page, normally used to protect websites from malicious traffic. But it had been altered to claim that each visitor’s IP address had been flagged for “irregular web activity.”

Visitors were then prompted to copy a code from the website and paste it into the terminal on their computers, a social engineering technique known as a ClickFix attack. When entered, the code, designed specifically for Mac computers, would download and install malware onto the user’s devices.

By Friday morning, the site was down. “We’ll be right back,” the homepage read. “We’re making improvements to better serve you. The store will be back online shortly — bolder than ever.”

It urged users to “stay based.”

‘Infostealer’ 

The malware discovery was made on Thursday by a social media user identified as “debbie.” In statements to Straight Arrow, debbie declined the title of security researcher and instead referred to herself as a “big time nerd.”

An article from The Atlantic drew debbie’s attention to Based Apparel. The article detailed Patel’s merchandising and his personalized bourbon bottles, which showcase the words “Kash Patel FBI Director” beneath the FBI shield.

What debbie discovered is that the code users were asked to copy and paste into their terminal appeared to say, “I am not a robot: Cloudflare Verification ID: 801470.”

But clicking copy actually grabbed totally different text that contained instructions for the terminal to download the malware without the user’s knowledge.

The malware type is known as an infostealer. A security researcher known online as “WifiRumHam,” who carried out an analysis of the malware, said the infostealer is designed to grab login credentials, browser cookies, information from more than 200 cryptocurrency browser extensions, Apple Notes data and passwords from each victim’s keychain.

WifiRumHam also claimed to have discovered a payment skimmer on the Based Apparel checkout page, designed to steal credit card information.

The attack, the security researcher said, was made possible thanks to a malicious WordPress plugin installed by the attacker. It’s unclear how the attacker initially gained access to Patel’s website.

No comment from Patel

Straight Arrow reached out to Based Apparel over X, as its website does not include contact information, but did not hear back. 

The FBI did not respond to Straight Arrow’s request for comment.

The incident on Based Apparel comes weeks after Patel faced similar embarrassment for the compromise of another personal account: his private email.

In late March, the Iranian-linked hacker group Handala published more than 300 emails from Patel’s Gmail inbox, exposing information such as family photos and his resume.


Round out your reading

Ella Rae Greene, Editor In Chief

Leave a Reply

Your email address will not be published. Required fields are marked *