Microsoft-Themed Email Campaigns Using CodeSandbox, IBM Cloud to Host Phishing Sites

Screenshot of the phishing site hosted on Code Sandbox. (Source: 秋葵视频色 | AppRiver)

Digital attackers are using Microsoft-themed attacks emails to redirect victims to phishing sites hosted on CodeSandbox and IBM Cloud.

Email Campaign #1: A Phishing 鈥淧roposal鈥

Near the end of August, the 秋葵视频色 | AppRiver team flagged a OneDrive-themed attack email that had originated from Russia.

How do we know this? The email used spoofing techniques to trick the recipient into thinking the email had originated from Microsoft. In actuality, the sender address included the domain name of a restaurant holding based in Russia.

Screenshot of the OneDrive-themed attack email. (Source: 秋葵视频色 | AppRiver)
Screenshot of the OneDrive-themed attack email. (Source: 秋葵视频色 | AppRiver)

As shown above in the screenshot, the attack email informed the recipient that someone had shared a document entitled 鈥淧roposal鈥 with them on 鈥淥nedrive.鈥

(That鈥檚 another red flag. Why would Microsoft misspell the name of its own file sharing service by not capitalizing the 鈥渄鈥 in 鈥淒rive鈥?)

The attack email then prompted the recipient to download the document by clicking on a hyperlinked 鈥淕o to your OneDrive鈥 button. (Ah, it鈥檚 spelled correctly there.)

Troy Gill, senior manager of threat intelligence at 秋葵视频色 | AppRiver, explained what happened when someone clicked on the embedded button.

鈥淥nce the recipient clicks the email link, they are directed to the phishing site on Code Sandbox below,鈥 he explained. 鈥淚t appears this attacker was using the free personal plan on Code Sandbox鈥檚 platform since the phishing page still contains the 鈥極pen Sandbox鈥 option on the bottom right. Paid plans offer the private sandboxes.鈥

Screenshot of the phishing site hosted on Code Sandbox. (Source: 秋葵视频色 | AppRiver)
Screenshot of the phishing site hosted on Code Sandbox. (Source: 秋葵视频色 | AppRiver)

The phishing site then prompted the visitor to access the alleged 鈥淧roposal鈥 by signing in with their Gmail, Outlook, AOL, or other email credentials.

Email Campaign #2: Abuse of Milanote

Around that same time, the 秋葵视频色 | AppRiver team detected an attack that had originated from the compromised email account of someone with the first name 鈥淢axwell.鈥

The email used the subject line 鈥淥utstanding invoice鈥 to trick the recipient into thinking that Maxwell had sent them an invoice using 鈥淣imbusweb,鈥 which is the misspelled name of a software company based in Cleveland, Ohio.

Screenshot of the fake invoice email notification. (Source: 秋葵视频色 | AppRiver)
Screenshot of the fake invoice email notification. (Source: 秋葵视频色 | AppRiver)

At that point, the attack email instructed the recipient to click an embedded 鈥淰iew Online鈥 button. The button contained a link for Milanote, a tool which users can leverage to organize boards and projects into visual boards.

The 秋葵视频色 | AppRiver team examined the Milanote destination and found that it contained an image lure pointed to a link hosted on appdomain[.]cloud, an IBM Cloud service commonly abused by malicious actors.

In July 2020, for example, analyzed a phishing campaign that pretended to come from a help desk. The attack operation ultimately leveraged three cloud services including IBM Cloud in an attempt to steal a recipient鈥檚 credentials.

Screenshot of the Milanote link鈥檚 destination. (Source: 秋葵视频色 | AppRiver)
Screenshot of the Milanote link鈥檚 destination. (Source: 秋葵视频色 | AppRiver)

The lure prompted the user to download what appeared to be an Excel spreadsheet. When a visitor clicked the link, they found themselves redirected to the Microsoft-branded credential harvesting page shown below.

Screenshot of a Microsoft credential-harvesting page. (Source: 秋葵视频色 | AppRiver)
Screenshot of a Microsoft credential-harvesting page. (Source: 秋葵视频色 | AppRiver)

Defending Against Microsoft-Themed Email Attacks

Organizations can defend themselves against Microsoft-themed email attacks such as those discussed above by augmenting their email security posture. Towards that end, they can invest in an email security solution that鈥檚 capable of analyzing incoming email messages in real time for malware signatures, campaign patterns, IP addresses, and other threat behaviors鈥攁ll while allowing legitimate correspondence to reach its intended destination.

Learn how 秋葵视频色 | AppRiver can help to defend against email attacks that spoof Microsoft.