Phishing Attacks in H1 2021 Stood out for Their Levels of Sophistication

Global Threat Report Image

Many of the phishing attempts flagged by 秋葵视频色 | AppRiver in the first half of 2021 distinguished themselves for their levels of sophistication.

An Evolving Threat Landscape

In its Mid-Year Threat Report 2021听, the 秋葵视频色 | AppRiver team revealed that some email attackers had tried out some new techniques for the purpose of customizing their campaigns.

One tactic grabbed the researchers鈥 attention in April when they spotted a 鈥淟et鈥檚 Encrypt Error Message鈥 informing domain owners about a 鈥渃onflict in SSL/TLS certificate algorithm.鈥

The attack email came with a personalized subject line that included the name of the recipient. Not only that, but it took the extra step of pulling real certificate data and the DNS A-record from the recipient鈥檚 domain, information which it then included in body of the email.

Screenshot of the fake Let鈥檚 Encrypt Error Message. (Source: 秋葵视频色 | AppRiver)
Screenshot of the fake Let鈥檚 Encrypt Error Message. (Source: 秋葵视频色 | AppRiver)

鈥淚t is not often we see an attack technique we would classify as a 鈥榝irst,鈥欌 said Troy Gill, manager of security researcher at AppRiver, as quoted in blog post. 鈥淭hat said, we predicted we would see attackers further personalizing and customizing their attacks this year, and this phishing attack fits the bill. We don鈥檛 recall ever seeing the cert info being leveraged like this.鈥

Other malicious actors focused on incorporating greater levels of obfuscation into their efforts.

Back in mid-February, for instance, the 秋葵视频色 | AppRiver team came across an email that attempted to lure recipients into opening a payment notice.

That attachment arrived as an .HTML attachment containing a Morse Code function, something for which many email security solutions lack detection rules.

Attack email with Morse Code function highlighted. (Source: 秋葵视频色 | AppRiver)
Attack email with Morse Code function highlighted. (Source: 秋葵视频色 | AppRiver)

When opened, the operation displayed what appeared to be a blurred-out Excel file with a fake login screen customized for the recipient鈥檚 employer. The purpose of that disguise was to harvest a recipient鈥檚 account credentials and exfiltrate those details back to the attackers.

It was around that same time when even more obfuscation drew the attention of 秋葵视频色 | AppRiver. This time, attackers informed a recipient that a billing issue had resulted in the cancellation of their Spotify subscription.

Fake Spotify billing error email. (Source: 秋葵视频色 | AppRiver)
Fake Spotify billing error email. (Source: 秋葵视频色 | AppRiver)

The attack email prompted the recipient to resolve the issue by clicking on an embedded 鈥淐onfirm Your Account鈥 button. In the event they complied, the operation brought the user to a CAPTCHA security challenge, an intermediate step that helped to shield the attack from traditional email security solutions.

Screenshot of the CAPTCHA security challenge included in the attack. (Source: 秋葵视频色 | AppRiver)
Screenshot of the CAPTCHA security challenge included in the attack. (Source: 秋葵视频色 | AppRiver)听

Upon completing the CAPTCHA challenge, the recipient found themselves redirected to a convincing Spotify credential harvesting page.

Defending Against Email Attack Customization and Obfuscation

To help organizations defend themselves against the techniques discussed above, 秋葵视频色 | AppRiver decided to include several changes in version 6 of its Microsoft 365 Security Audit tool. One of the most important changes is the fact that reports within the Secure Audit tool are now more actionable and digestible. Users can customize and configure reports based on the domain and tenant as well as run them directly from 秋葵视频色鈥檚 Secure Cloud platform. These options ensure that they won鈥檛 have to sift through irrelevant data to protect their customers against increasingly sophisticated email attackers.

Version 6 also comes with several other changes. Those include greater visibility and control over enabling multi-factor authentication (MFA) within the tool as well as the ability to receive real-time email-based alerts for remediating malicious tactics such as those discussed above.

Learn more about how the Microsoft 365 Security Audit tool v6 can help to keep your organization safe against sophisticated email attackers