Phishing Page Semakan Tunai Rahmah

🚨 Phishing Analysis: Fake ‘Sumbangan Tunai Rahmah’ (STR) Status Check Page

Date: March 2026
Target: Malaysian Citizens (Sumbangan Tunai Rahmah Recipients)
Author: Mr Ayiezola


1. Executive Summary

This report documents a phishing campaign active during the Starting 2026 season. The attackers are impersonating the official Sumbangan Tunai Rahmah (STR) portal to harvest personal information (Phone Number) and Telegram OTP Code.

⚠️ DANGER: The URL https://bantuanstr.infopublic.my.id/e/ is confirmed MALICIOUS. Do not enter real data.

Phishing Landing Page
Full Chain Phishing ATO.


2. Threat Intelligence & Infrastructure

This section outlines the core technical indicators identified during the initial triage.

Entity Intelligence Detail
Primary Phishing URL https://bantuanstr.infopublic.my.id/e/
Collector Domain berjaya66.my.id (C2 Backend)
Target Region 🇲🇾 Malaysia (International Code: +60)
Impersonated Theme Sumbangan Tunai Rahmah (STR) 2026
Attack Vector Telegram Social Engineering (SE)
Threat Status ACTIVE / MALICIOUS

🚩 Geographic Red Flags

[!IMPORTANT] Top-Level Domain (TLD) Mismatch: The use of the .my.id TLD is a definitive indicator of fraud. Official Malaysian government services strictly utilize the .gov.my hierarchy. The .id extension is assigned to Indonesia, confirming that this infrastructure is not managed by the Malaysian Ministry of Finance or LHDN.


3. Visual Analysis & Proofs

Delivery Method & Social Engineering

The threat actor uses Telegram Group to deliver phishing link. TA also put some captions to increase the link’s trustworthiness.

Phishing Landing Page
Figure 1: Threat Actor Spread Phishing Link In Telegram Group.

A. Landing Page Impersonation

The page uses the official LHDN and Malaysia Madani logos to create a false sense of authority.

Phishing Landing Page
Figure 2: Main landing page.

The TA may post fake testimonials or ‘success’ messages in the group to convince others the link is safe

Phishing Landing Page
Figure 3: Fake Testimonials.

B. Data Harvest & Account Takeover Form

The phishing flow transitions from simple data collection to an active account hijacking attempt:

  1. Phone Number Collection: The form first requests the victim’s name and mobile phone number.
  2. Real-time Exploitation: Once the number is submitted, the backend triggers a legitimate Telegram login request to the victim’s device.
  3. OTP Interception: The victim is redirected to a second page prompting them to enter the OTP code sent to their Telegram account.
Note: This is a classic "Man-in-the-Middle" (MitM) technique. If the victim provides the OTP, the attacker gains full access to their Telegram account, contacts, and private messages.

Data Capture Form
Figure 4: Form capturing victim's name and phone number.

OTP Capture
Figure 5: Form capturing victim's Telegram OTP.

Indicators of Compromise (IoCs)

  • URL: https://bantuanstr.infopublic.my.id/e/
  • Name: [Insert Name]
  • Phone Number: [Insert Phone Number]
  • OTP: [Insert OTP]

4. Technical Findings & Data Exfiltration

A. Infrastructure Recon

Investigation of the domain infopublic.my.id revealed several technical red flags:

  • Registrar: PT Digital Registra Indonesia.
  • Localization Errors: Figure 6 shows the use of “Opsional,” confirming an Indonesian origin for the phishing kit.
  • Favicon Spoofing: Figure 7 shows the TA pulling the official favicon directly from hasil.gov.my to enhance visual trust.

B. Server Misconfigurations (Content Exposure)

Due to poor server hardening, several internal directories were exposed:

  • Directory Indexing: Figure 12 shows a full list of the phishing kit’s files.
  • CPanel & Robots.txt: Access to these files (Figures 10 & 11) helped map the attacker’s infrastructure.

C. The “Smoking Gun”: Telegram Bot Interception

The most significant find was the exposure of the Telegram Bot Token (Figure 19). Analysis of the bot traffic revealed:

  1. Name & Phone Numbers: Real-time harvesting of Malaysian citizen data.
  2. OTP Interception: Active Man-in-the-Middle attacks on Telegram accounts.
  3. Collateral Damage: The bot was also used to harvest TikTok credentials (Figure 26) and private images (Figure 23), suggesting a broader identity theft operation.

Code Review

OTP Capture
Figure 6: Snippet of the source code showing "Opsional" (Indonesian spelling) instead of the Malaysian "Optional".

Analysis: This suggests the phishing kit was either developed by an Indonesian-speaking threat actor or repurposed from a template originally targeting Indonesian banking/aid portals.

OTP Capture
Figure 7: TA Use Valid Favicon Icon From Official Domain (hasil.gov.my).

OTP Capture
Figure 8: Error Configure Landing Page.

OTP Capture
Figure 9: List of available path.

OTP Capture
Figure 10: CPanel Login.

OTP Capture
Figure 11: Robots.txt.

OTP Capture
Figure 12: Content Expose via Page Indexing.

OTP Capture
Figure 13: Checking Host IP Address.

OTP Capture
Figure 14: Subdomain Recon.

OTP Capture
Figure 15: Nameserver Info.

OTP Capture
Figure 16: Fuzzing valid path.

OTP Capture
Figure 17: Path Data Expose.

5. JavaScript Configuration in index.php

Deep analysis of the index.php source code revealed a window.setting configuration object. This script serves as the “brain” of the phishing kit, managing data flow and psychological manipulation.

A. Command & Control (C2) Endpoint

  • Endpoint URL: https://berjaya66.my.id/bot/
  • Analysis: This is the primary collector. All captured data (Name, Phone Numbers, and OTPs) is POSTed to this URL. The use of a separate domain for the backend (berjaya66.my.id) allows the attacker to keep harvesting data even if the front-end landing page is taken down.

B. Geo-Targeting (Malaysia)

  • Attributes: COUNTRY_CODE: '+60', COUNTRY_ID: 'my'
  • Analysis: The kit is hardcoded to target Malaysian citizens. The script automatically applies the Malaysian international dialing code, ensuring the stolen phone numbers are ready for the attacker to use for Telegram hijacking immediately.

C. Man-in-the-Middle (MitM) Timer Logic

  • Attributes: otp: { expirationTime: 300 }
  • Analysis: The script implements a 300-second (5-minute) countdown.
    • Psychological Tactic: This creates a false sense of urgency. By mimicking a legitimate bank or Telegram security timer, it pressures the victim into entering their OTP as quickly as possible, bypassing their natural suspicion.
    • Technical Tactic: The expired: false status indicates that the backend is actively listening for an incoming OTP session from the victim’s device.

OTP Capture
Figure 18: Analysis of the hardcoded window.setting configuration.

6. Deep Dive: Telegram Hijacking Logic (otp-controller.js)

Analysis of the handleOtp function confirms a highly sophisticated Man-in-the-Middle (MitM) attack designed for Telegram account takeover.

A. Technical Features:

  • Session Pairing: The script harvests phone_code_hash from the browser’s storage. This value is required to complete the login process on the attacker’s server.
  • 2FA Detection: The code includes logic to detect if the victim has Two-Factor Authentication enabled. If needs_2fa is returned from the C2 server, the UI dynamically switches to harvest the victim’s Telegram Password.
  • Data Exfiltration: Data is packaged into a JSON object and sent via a custom sendMessageToTelegram function.

Captured Data Payload:

{
  "code": "Stolen_OTP",
  "phone_number": "Victim_Number",
  "session_id": "Session_ID",
  "phone_code_hash": "Telegram_Internal_Hash"
}

OTP Capture
Figure 19: Logic within otp-controller.js showing code to grab OTP and 2FA for bypassing Telegram security.

7. Multi-Domain Phishing Campaign (2026 Expansion)

Our investigation has uncovered that the threat actor (TA) is not relying on a single URL. A second, identical phishing page has been identified, indicating a wider coordinated campaign targeting Malaysians.

Newly Identified Asset:

  • Secondary URL: [https://umrahpercumah.infopublic.my.id/a/]
  • Status: Active

Comparative Analysis

Both sites share the same codebase, design, and exfiltration logic (Telegram-based OTP harvesting). This “mirroring” tactic is used to:

  1. Redundancy: Maintain uptime if the primary infopublic.my.id.

OTP Capture
Figure 20: Found another Phishing Page for 2026.

OTP Capture
Figure 21: Threat Actor Telegram Token Expose.

OTP Capture
Figure 22: Bot Info.

OTP Capture
Figure 23: Bot Info.

OTP Capture
Figure 24: Capturing Previous Log / Content From Telegram Bot Token.

OTP Capture
Figure 25: Captured Image.

OTP Capture
Figure 26: Image That Has Been Upload to Phishing Page.

OTP Capture
Figure 27: Captured Phone Number and OTP.

OTP Capture
Figure 28: Capturing Tiktok Account Credentials.

OTP Capture
Figure 29: Image Captured Showing Other Phishing Page.


5. Prevention & Reporting

Official Links:

How to Report:

  1. Call NSRC (National Scam Response Centre) at 997.
  2. Report the URL via Google Safe Browsing.
  3. Use the SemakMule portal by PDRM.

OTP Capture
Figure 30: Done submit report to google safe browsing.


Back to Home

Share: Twitter Facebook LinkedIn