David Bisson / en Formbook Loader Distributed in Three “Extremely Aggressive” Email Attacks /resources/blog/february-2022/formbook-loader-distributed-three-extremely-aggressive-email-attacks <span>Formbook Loader Distributed in Three “Extremely Aggressive” Email Attacks </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 02/15/2022 - 22:32</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2022-02/Picture3_0.jpg" width="1274" height="995" alt="Screenshot of the final Formbook attack email (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Malicious actors launched three “extremely aggressive” email attacks in which they attempted to distribute samples of the Formbook loader.</span></span></p> <h2><span><span><span><span><span>Campaign #1: A Fake Wire Transfer Notice</span></span></span></span></span></h2> <p><span><span>Troy Gill, manager of security research at Ƶɫ | AppRiver, explained that Formbook has regularly made an appearance on the security firm’s systems since late 2021.</span></span></p> <p><span><span>“Our malware filters have been capturing some extremely aggressive <strong>Formbook</strong> loader attacks over the past few months using multiple different ruses attempting to dupe recipients,” he said.</span></span></p> <p><span><span>The firm detected the first attack email in mid-January. It arrived with the subject line “Wire request initiated,” and it used spoofing techniques to make the message appear as if it had originated from an American multinational financial services company. </span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-02/Picture1_0.jpg" width="1136" height="538" alt="Screenshot of the first Formbook-laden attack email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the first Formbook-laden attack email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>The email informed the recipient that the financial services company had begun processing a wire funds transfer request from their account. It went on to explain that the recipient could cancel the wire transfer by downloading a Word document. Once opened, the file downloaded a Formbook sample onto the recipient’s machine.</span></span></p> <h2><span><span><span><span><span>Campaign #2: A Bogus Letter of Dismissal</span></span></span></span></span></h2> <p><span><span>The Ƶɫ | AppRiver team came across the second Formbook attack campaign a few days later. </span></span></p> <p><span><span>Using the subject line “Letter of Dismissal,” those who crafted the email claimed to be an unnamed “HR Manager” to try to convince the recipient that their employer was letting them go.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-02/Picture2_0.jpg" width="777" height="562" alt="Screenshot of the phony dismissal letter. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the phony dismissal letter. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>“Due to the affect of covid-19 epidemic in our company, we have no choice but to end your employment with us because we cannot service all the employees anymore,” the email stated.</span></span></p> <p><span><span>The message went on to inform the recipient that the company had sent along a two-month salary receipt as an attachment. When opened, however, the attached .RAR file dropped Formbook as a payload on the victim’s computer.</span></span></p> <h2><span><span><span><span><span>Campaign #3: A Counterfeit Purchase Order</span></span></span></span></span></h2> <p><span><span>The final Formbook campaign came in the form of a minimalist attack email. It instructed the recipient to view a screenshot of a made-up purchase order embedded in the message. </span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-02/Picture3_0.jpg" width="1274" height="995" alt="Screenshot of the final Formbook attack email (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the final Formbook attack email (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Those responsible for the campaign included the screenshot in their email to try to trick the recipient into opening a Formbook-laden Excel spreadsheet.</span></span></p> <h2><span><span><span><span><span>An Ongoing Relationship with Formbook</span></span></span></span></span></h2> <p><span><span>The attacks discussed above aren’t the first Formbook operations detected by Ƶɫ | AppRiver in the past couple of years.</span></span></p> <p><span><span>Back in April 2020, for instance, the Ƶɫ | AppRiver team witnessed email attackers <a href="/resources/blog/april-2020/hackers-using-covid19-stimulus-exploit-end-users" rel="nofollow">impersonating the U.S. Small Business Association</a> (SMA). The malicious actors used that guise to trick the recipient into thinking they had received an SBA grant so that they would open an attachment. If the recipient complied, the campaign initially delivered the Remcos remote access trojan before eventually dropping Formbook.</span></span></p> <p><span><span>It was about a year later when Ƶɫ | AppRiver <a href="/resources/mid-year-2021-threat-report" rel="nofollow">flagged two additional Formbook operations</a>. The first delivered the threat using malicious macros inside a deed-themed Word document. The other leveraged an “approved order” as a lure to deliver an executable file that began the Formbook infection process upon execution.</span></span></p> <h2><span><span><span><span><span>Defending Against Formbook Attacks</span></span></span></span></span></h2> <p><span><span>The attack campaigns discussed above highlight how organizations need to strengthen their email security postures against digital threats like Formbook. One of the ways they can do that is by investing in an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> that can scan incoming messages for malware signatures and other threat indicators. This type of solution, when combined with regular security awareness training, will help to prevent threats from gaining a foothold in employees’ inboxes, all while allowing legitimate messages to reach their intended destination.</span></span></p> Wed, 16 Feb 2022 04:32:36 +0000 admin 518 at Attackers Targeting Mortgage Servicers to Steal Email Accounts Credentials /resources/blog/february-2022/attackers-targeting-mortgage-servicers-steal-email-accounts <span>Attackers Targeting Mortgage Servicers to Steal Email Accounts Credentials </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 02/09/2022 - 15:41</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2022-02/Picture2.jpg" width="1486" height="836" alt="Screenshot of the jump page. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Digital attackers are targeting mortgage servicers and their clients to try to steal victims’ email account credentials.</span></span></p> <h1><span><span><span><span><span>Data Theft as a Final Payoff</span></span></span></span></span>=</h1> <p><span><span>At the end of January, the Ƶɫ | AppRiver team flagged an email informing the recipient that they needed to submit a mortgage payment prior to the date contained in an attached payoff statement.</span></span></p> <p><span><span>“Attached” is an odd choice of words here considering that the email didn’t arrive with an attached file. Instead, it arrived with an embedded hyperlinked button named, “Access Payoff Statement File Here.”</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-02/Picture1.jpg" width="1248" height="910" alt="Screenshot of the mortgage-themed attack email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the mortgage-themed attack email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Misleading wording wasn’t the only element that gave the attack email away as a fake. As seen in the screenshot included above, the message came with a signature block indicating that it had originated from a nationwide mortgage lender service…with the exception of the physical address. That location pointed to another mortgage service entirely. </span></span></p> <p><span><span>Other signs gave away this discrepancy. For instance, the sender email address ended with .EDU—an unusual domain for an established mortgage service company. Ƶɫ | AppRiver reasoned that those responsible for this attack likely compromised the account of someone working at an educational institution to conduct their campaign.</span></span></p> <p><span><span>Not only that, but the phone number included in the signature block didn’t belong to the mortgage lender specifically mentioned in the message or the other company whose address appeared in the email. A Google search of the number didn’t yield any meaningful results.</span></span></p> <h1><span><span><span><span><span>Following the Button</span></span></span></span></span></h1> <p><span><span>Clicking on the embedded button redirected the recipient to a website that appeared to be a page operated by the named mortgage lender service. The page used stolen branding to convince the recipient to click on an “Payoff Statement Access Here” button so that they could view an “encrypted payoff mortgage file.”</span></span></p> <p><span><span>Once again, however, the jump page gave itself away as a fake. How? By the inclusion of a statement indicating that whoever built the website did so using site123[.]me, a service for building free websites. </span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-02/Picture2.jpg" width="1486" height="836" alt="Screenshot of the jump page. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the jump page. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Given its profile in the mortgage lending field, the targeted service likely relies on its own web team—not a free website builder—to maintain its digital presence.</span></span></p> <p><span><span>It’s therefore not surprising that the jump page didn’t present a mortgage payoff statement to the user. Instead, it redirected them to a phishing landing page with an even more suspicious domain name to try to steal their email account credentials.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-02/Picture3.jpg" width="1486" height="825" alt="Screenshot of the phishing landing page. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the phishing landing page. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <h1><span><span><span><span><span>Keeping a Fixed Email Security Focus for the Long Term</span></span></span></span></span></h1> <p> </p> <p><span><span>Troy Gill, manager of security research at Ƶɫ | AppRiver, doesn’t think that email attackers will refrain from using mortgages as a lure anytime soon.</span></span></p> <p><span><span>“Business email compromise attacks targeting mortgage servicers and their clients continue to be an ongoing threat to customers,” he said. “The simplicity of the attack along with the low barrier to entry with a quick payoff keeps it an enticing vector for attackers.”</span></span></p> <p><span><span>That’s especially not the case with mortgages haven’t just leapt up to nearly 4% in recent weeks—the highest they’ve been since October 2019, reported <a href="https://www.mortgagenewsdaily.com/markets/mortgage-rates-02042022" rel="nofollow">Mortgage News Daily</a>.</span></span></p> <p><span><span>Acknowledging that reality, organizations need to take action to defend themselves against mortgage-themed campaigns. They can do so by using security awareness training to educate their employees about common tactics and slip-ups committed by email attackers. They can then complement those measures with an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> that can scan incoming messages for malware signatures and other threat indicators, blocking suspicious messages before they reach an employee’s inbox while allowing legitimate messages to reach their intended destination.</span></span></p> Wed, 09 Feb 2022 21:41:07 +0000 admin 516 at 6.5 Billion Emails Quarantined in 2021 /resources/blog/january-2022/65-billion-emails-quarantined-2021 <span>6.5 Billion Emails Quarantined in 2021</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 01/26/2022 - 16:03</span> <a href="/taxonomy/term/12" hreflang="en">Email Security</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2022-01/threat_report_pdf_thumb.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>The Ƶɫ | AppRiver team quarantined 6.5 billion emails in 2021, a volume which constituted a 12.5% increase over the previous year.</span></span></p> <h2><span><span><span><span><span>A Year of Email Attacks in Review</span></span></span></span></span></h2> <p><span><span>In its <a href="/resources/report/global-threat-report-full-year-2021" rel="nofollow">“Global Threat Report: Full Year 2021,”</a> Ƶɫ | AppRiver revealed that emails with malware attachments decreased in volume to below five million during the first five months of the year. Those messages jumped up above 15 million the following month and ended at around the same level in December 2021. That was after the team detected over 25 million emails with attached malware samples in November.</span></span></p> <p><span><span>Overall, the Ƶɫ | AppRiver team flagged 165 million email messages with malicious attachments through <a rel="nofollow">2021.</a></span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture1.png" width="1264" height="684" alt="The monthly totals of directly attached malware emails in 2021. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>The monthly totals of directly attached malware emails in 2021. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>When it examined the origins of these and other malware attacks, the Ƶɫ | AppRiver team observed that many of the email campaigns had originated from the United States. China came in with the second highest number of attacks at just over 10 million. This attack volume marked a growth rate of 240% for the country when compared with 2020.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture2_0.png" width="1266" height="680" alt="The top 10 most common email malware attack origins in 2021. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>The top 10 most common email malware attack origins in 2021. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Ƶɫ | AppRiver also examined the most common attachment file types used by email attackers in 2021. Excel worksheets were the most common. Even so, malicious HTM/HTML attachments increased throughout the entire year.</span></span></p> <h2><span><span><span><span><span>Sources of Inspiration for Their Attacks</span></span></span></span></span></h2> <p><span><span>The Ƶɫ | AppRiver team witnessed malicious actors seize on various events as inspiration for their attacks in 2021. Let’s examine a couple of these below.</span></span></p> <h3><span><span><span><span>The Kaseya Supply Chain Attack</span></span></span></span></h3> <p><span><span>Following the <a href="/resources/blog/july-2021/revil-ransomware-gang-demands-70m-kaseya-software-supply-chain-attack" rel="nofollow">software supply chain attack involving Kaseya in July 2021</a>, Ƶɫ | AppRiver <a href="/resources/blog/july-2021/malware-distributors-leverage-kaseya-attack" rel="nofollow">detected a malicious email</a> that claimed to be offering a patch for the affected software product. The attack email instructed the recipient to open an attached executable file for the purpose of resolving a Kaseya weakness. Once executed, the file loaded Cobalt Strike, commercially available pentesting software which malicious actors can weaponize as an attack tool. </span></span></p> <h3><span><span><span><span>Global Shipping Issues</span></span></span></span></h3> <p><span><span>Several months later, the researchers at Ƶɫ | AppRiver detected an attack campaign that <a href="/resources/blog/november-2021/phishers-impersonating-maersk-line-steal-victims-email-credentials" rel="nofollow">claimed to originate from Maersk Line</a>. The message used stolen branding to trick the recipient into thinking that the email had originated from the shipping company. From there, the email instructed the recipient to view some documents including an invoice, a bill of lading, and a packing list by clicking on a “Download Confirmation” button. If the user complied, the campaign redirected them to a phishing page designed to steal their email account credentials. </span></span></p> <h2><span><span><span><span><span>Email Attack Predictions for the Year Ahead</span></span></span></span></span></h2> <p><span><span>Looking forward to 2022, the Ƶɫ | AppRiver team has several predictions for where email attacks will go. First, they noted that there will be greater coordination between threat groups. The researchers witnessed such collusion following Emotet’s takedown in 2021. Trickbot’s operators stepped up and began distributing Emotet later in the year. This activity helped malicious email traffic involving Emotet to <a href="/resources/blog/november-2021/emotets-it-again" rel="nofollow">increase beginning in mid-November</a>.</span></span></p> <p><span><span>Second, the Ƶɫ | AppRiver team anticipates that attackers will make more attempts to target software supply chain attacks like Kaseya. Doing so will help malicious actors to broaden their impact to dozens if not hundreds or even thousands of companies with a single compromise. </span></span></p> <p><span><span>Finally, researchers at the security firm wrote that digital criminals are going to continue turning to spear-phishing attacks in 2020. Such activity will support attackers as they devise new customization tactics—all for the purpose of focusing even further on their targets.</span></span></p> <h2><span><span><span><span><span>Email Defense for 2022</span></span></span></span></span></h2> <p><span><span>The predictions discussed above highlight the need for organizations to invest in their email threat protection over the following year. They need to prioritize building more specificity into their email defenses. Towards that end, they could consider investing in an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> that’s capable of scanning incoming messages at multiple levels for the purpose of blocking email attacks while allowing legitimate correspondence to reach their destination.</span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 26 Jan 2022 22:03:44 +0000 admin 514 at Log4Shell Targeted by Email Attackers in Two Campaigns /resources/blog/january-2022/log4shell-targeted-email-attackers-two-campaigns <span>Log4Shell Targeted by Email Attackers in Two Campaigns </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 01/17/2022 - 15:58</span> <a href="/taxonomy/term/12" hreflang="en">Email Security</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2022-01/cover%20%281%29.png" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>The Ƶɫ | AppRiver team spotted two campaigns in which email attackers attempted to exploit a <a href="https://www.opentext.com/support/log4j-remote-code-execution-advisory" rel="nofollow">recently disclosed Log4j vulnerability</a> on susceptible systems.</span></span></p> <h2><span><span><span><span><span>A Bit of Background on Log4j</span></span></span></span></span></h2> <p><span><span>As explained by the <a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance" rel="nofollow">U.S. Cybersecurity & Infrastructure Security Agency</a> (CISA), the Log4j vulnerability (detected as <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" rel="nofollow">CVE-2021-44228</a> and dubbed “Log4Shell”) is a critical remote code execution flaw that affects versions 2.0-beta9 to 2.14.1 of Log4j, Apache’s Log4j software library which services can use to log security and performance information. Those services include background modules that that help to process email header information as well as perform analytics and reporting.</span></span></p> <p><span><span>CVE-2021-44228 affects Log4j’s Java Naming and Directory Interface (JNDI) insofar as some of its features “do not protect against adversary-controlled LDAP [Lightweight Directory Access Protocol] and other JNDI related endpoints.” Malicious actors can use a specially crafted request to exploit the flaw and execute arbitrary code for the purpose of infecting the system, exfiltrating information, and/or deploying ransomware. For the purposes of this article, they can launch an email attack where Log4j parses a string, executes malicious code, and compromises a system that attempts to log information about the email.</span></span></p> <h2><span><span><span><span><span>Campaign #1: A Slack Workplace Invitation</span></span></span></span></span></h2> <p><span><span>As soon as it learned of the Log4j vulnerability’s disclosure on December 10, 2021, the Ƶɫ | AppRiver team prepared itself for attack attempts to begin spreading over organizations’ email systems. It was just four days later when the team detected the first such attempt. In the weeks that followed, those attacks grew in frequency and creativity.</span></span></p> <p><span><span>Which brings us to one campaign flagged by the Ƶɫ | AppRiver team in the beginning of January. For this attack, someone by the name of “Smith John” invited a recipient to join a Slack workplace. The invite came with a unique workplace name crafted to exploit CVE-2021-44228.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture1.jpg" width="1013" height="1012" alt="Screenshot of the Slack workplace invitation. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the Slack workplace invitation. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>“I assume the attacker is hoping that the attempt would be logged by a vulnerable system and trigger the exploit,” noted Troy Gill, senior manager of threat intelligence at Ƶɫ | AppRiver. “We don’t know for sure if that was strictly intended as an email attempt or if the attacker was trying to send the exploit via Slack and that action triggered an email. Or both maybe?”</span></span></p> <h2><span><span><span><span><span>Campaign #2: An AWS Attack</span></span></span></span></span></h2> <p><span><span>It was around that same time when the Ƶɫ | AppRiver team came across another attack that attempted toe exploit the Log4j vulnerability. Whoever designed this attempt dispensed with concealing their efforts behind a well-known brand like Slack. Instead, they sent out an email with the exploit code for Log4Shell included not only in the subject line but also in the body of the attack email. </span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture2.jpg" width="627" height="103" alt="Screenshot of the attack email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the attack email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Gill and his team analyzed the email and found that its sender had data theft on their mind.</span></span></p> <p><span><span>“It was trying to retrieve multiple AWS items along with java and virtual machine information,” he pointed out. “This AWS attack tried to retrieve the secret access key, session token, shared credentials file, web identity token file, profile, config file, and access key ID. I’m not sure about the efficacy of this attack, but it is certainly being attempted. </span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture3.jpg" width="1184" height="304" alt="Screenshot of some of the AWS items targeted by the attack email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of some of the AWS items targeted by the attack email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <h2><span><span><span><span><span>How to Defend Against Email Attacks Targeting CVE-2021-44228</span></span></span></span></span></h2> <p><span><span>The campaigns described above highlight the need for organizations to defend themselves against attack attempts that seek to exploit CVE-2021-44228. One of the ways they can do that is by using an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> that can analyze incoming messages for known vulnerabilities and other malicious indicators. Simultaneously, organizations should seek to patch Log4Shell using their vulnerability management programs.</span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Mon, 17 Jan 2022 21:58:15 +0000 admin 512 at Microsoft Exchange Servers Hacked to Distribute SquirrelWaffle /resources/blog/december-2021/microsoft-exchange-servers-hacked-distribute-squirrelwaffle <span>Microsoft Exchange Servers Hacked to Distribute SquirrelWaffle</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 12/06/2021 - 15:35</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-12/man_coding.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Digital attackers hacked organizations’ vulnerable Microsoft Exchange Servers to distribute SquirrelWaffle malware.</span></span></p> <h2><span><span><span><span><span>Details of the Attack Campaign</span></span></span></span></span></h2> <p><span><span>In mid-November 2021, <a href="https://www.trendmicro.com/en_us/research/21/k/Squirrelwaffle-Exploits-ProxyShell-and-ProxyLogon-to-Hijack-Email-Chains.html" rel="nofollow">Trend Micro</a> examined the initial access vector for several digital intrusions that occurred in the Middle East.</span></span></p> <p><span><span>The security firm’s incident response team determined that all the attacks originated from on-premises Microsoft Exchange Servers. A closer look uncovered evidence of malicious actors having exploited <a href="/resources/blog/march-2021/hafnium-just-first-many-threat-actors-exploit-proxylogon" rel="nofollow">ProxyLogon</a> and ProxyShell on those resources. </span></span></p> <p><span><span>One of those campaigns leveraged conversation hijacking, a tactic executed by the Emotet gang <a href="/resources/blog/may-2020/emotet-actors-use-conversation-hijacking-attack-deliver-qakbot" rel="nofollow">more than</a> <a href="/resources/blog/november-2021/emotets-it-again" rel="nofollow">once</a>, to inject themselves into existing email threats. Those responsible for the attack also used true account names from the victim’s domain for the sender and the recipient. In doing so, they increased the chances that someone would follow the email’s instructions.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-12/Picture1.png" width="856" height="271" alt="The malicious spam email received by targets. (Source: Trend Micro)" loading="lazy" typeof="foaf:Image" /></article><figcaption>The malicious spam email received by targets. (Source: Trend Micro)</figcaption></figure><p> </p> <p><span><span>As is evident in the above screenshot, the email didn’t exactly relay its instructions eloquently. </span></span></p> <p><span><span>“Our specialists composed desired document and I send it to you,” it informed the recipient. “Document can be found through this link.”</span></span></p> <p><span><span>Trend Micro went on to inspect the headers for the attack emails. They discovered that the mail path was internal between three Exchange Servers’ mailboxes. The threat actor didn’t drop any tools for moving laterally. They also didn’t execute malware on the Exchange servers that would have triggered alerts before the emails spread across the environment.</span></span></p> <p><span><span>“The attacker exploited the Exchange servers to deliver internal mails,” Trend Micro explained. “This was all done to catch users off-guard, making them more likely to click the link and open the dropped Microsoft Excel or Word file.”</span></span></p> <p><span><span>Both links embedded in the malicious emails dropped a .ZIP file containing a Microsoft Excel sheet or Word document. Once downloaded, the documents used malicious Excel 4.0 macros to download and execute a malicious DLL related to Qbot (otherwise known as “QakBot”). This infection ultimately led the campaign to infect the machine with “SquirrelWaffle.”</span></span></p> <h2><span><span><span><span><span>Squirrel-What?</span></span></span></span></span></h2> <p><span><span>SquirrelWaffle first made news in late October when <a href="https://blog.talosintelligence.com/2021/10/squirrelwaffle-emerges.html?__cf_chl_captcha_tk__=vvizKST.uR5Hy5wy6kkdXt5.JEqHJQa0a_cP29mY9as-1639000262-0-gaNycGzNBtE" rel="nofollow">Cisco Talos</a> spotted some spam campaigns infecting systems with the new malware loader. Upon successful infection, SquirrelWaffle granted threat actors the foothold they needed to infiltrate organizations’ systems and network environments as well as to conduct additional compromise attempts and malware infections.</span></span></p> <p><span><span>The Ƶɫ | AppRiver team observed this exact behavior in a SquirrelWaffle campaign that took place in mid-November.</span></span></p> <p><span><span>Like the operation detected by Trend Micro, the malicious actors behind this attack attempt used conversating hijacking techniques to inject themselves into an existing email thread with the subject line “Re: S.A.M. Newark Lay out.” </span></span></p> <p><span><span>The attackers said that they had “uploaded some additional info regarding the recent contract and payslip.” They went on to instruct the recipient that they could resolve a previously mentioned problem if they chose to “follow steps via the link lower.”</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-12/Picture2.jpg" width="780" height="351" alt="Screenshot of the November SquirrelWaffle email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the November SquirrelWaffle email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Clicking on either of the links led victims to a SquirrelWaffle payload. At that point, the malware followed up by dropping either QakBot or Cobalt Strike onto the infected machine.</span></span></p> <h2><span><span><span><span><span>Defending Against Email-Borne SquirrelWaffle Attacks</span></span></span></span></span></h2> <p><span><span>The attack instances discussed above highlight the need for organizations to defend themselves against SquirreWaffle. One of the ways they can do that is by reviewing their vulnerability management programs to make sure they’re prioritizing and implementing software patches on a timely basis. Regarding the campaign detected by Trend Micro, for example, Microsoft released a patch for ProxyLogon in <a href="https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/" rel="nofollow">March</a> and similar fixes for ProxyShell <a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/proxyshell-vulnerabilities-and-your-exchange-server/ba-p/2684705" rel="nofollow">a few months later</a>. Organizations can then go on to pair their vulnerability management efforts with a <a href="/products/email-threat-protection" rel="nofollow">multi-layered email security solution</a> that scans incoming messages for potential threats. </span></span></p> Mon, 06 Dec 2021 21:35:27 +0000 admin 502 at Microsoft Password Expiration Scam Uses Customized Image to Steal Victims’ Account Details /resources/blog/november-2021/microsoft-password-expiration-scam-uses-customized-image-steal-victims <span>Microsoft Password Expiration Scam Uses Customized Image to Steal Victims’ Account Details </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 11/29/2021 - 15:00</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-11/Picture1_0.jpg" width="1205" height="762" alt="Screenshot of the fake Microsoft password expiration notice. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><p><span><span>A Microsoft password expiration scam used an image customized with a recipient’s email address and domain to steal their account credentials.</span></span></p> <h2><span><span><span><span><span>“Request (for Data Theft) Received”</span></span></span></span></span></h2> <p><span><span>In early November, Ƶɫ | AppRiver flagged an email that appeared to originate from the helpdesk at a recipient’s company. (The attackers included “HelpDesk” in their email’s subject line to support this ruse.)</span></span></p> <p><span><span>But the email didn’t originate from a helpdesk team. Its sender line indicated that it came from a B2B platform serving the commercial real estate industry.</span></span></p> <p><span><span>Using branding stolen from Microsoft, the attack email impersonated a password expiration notice and informed the recipient that their password was set to expire in seven days. It included the recipient’s name, domain, and email address to add a sense of legitimacy.</span></span></p> <p><span><span>From there, the attack email instructed the recipient to “take the time now to maintain your password activity to avoid login interruption” by clicking on a “Keep My Password” button.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-11/Picture1_0.jpg" width="1205" height="762" alt="Screenshot of the fake Microsoft password expiration notice. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the fake Microsoft password expiration notice. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>As you can see from the screenshot above, the email included the warning that “Microsoft will not be held responsible for any account loss.” </span></span></p> <p><span><span>That’s an imperfect replication of Microsoft’s terms of service. These read as follows: “Microsoft will not be liable for any loss that you may incur as a result of someone else using your password or account, either with or without your knowledge. However, you could be held liable for losses incurred by Microsoft or another party due to someone else using your account or password.”</span></span></p> <p><span><span>Now, this isn’t the first time Ƶɫ | AppRiver came across a Microsoft-themed password expiration scam. Not by a long shot. But it is the first instance where the security firm observed a specific tactic in play. </span></span></p> <p><span><span>Here’s Troy Gill, manager of threat intelligence at Ƶɫ | AppRiver, with more.</span></span></p> <p><span><span>“Instead of the normal text, it utilized an image link for the lure <em>but</em> the image itself was customized to contain the recipients email address and domain,” he explained. “It was also an automated attack being sent in large volumes indicating the attacker had an automated setup for these and not manually changing each image for the recipients.”</span></span></p> <h2><span><span><span><span><span>“Keep My Password”…Literally, You Can Take It</span></span></span></span></span></h2> <p><span><span>If a user complied with the attackers’ instructions and clicked on a customized image, the campaign redirected them to a phishing page that abused workers.dev as a means of living off the land (LotL) of Cloudflare’s reputation.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-11/Picture2.jpg" width="1451" height="828" alt="Screenshot of the phishing page abusing Cloudflare’s workers.dev. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the phishing page abusing Cloudflare’s workers.dev. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Malicious actors continue to resort to LotL techniques as a way of evading detection. Back in <a href="/resources/blog/october-2021/docusign-abused-phishers-target-victims-email-account-credentials" rel="nofollow">September 2021</a>, for instance, Ƶɫ | AppRiver came across an operation that abused DocuSign to trick victims into handing over their credentials for Outlook, Office365, or another email client.  </span></span></p> <p><span><span>This campaign doesn’t even include <a href="/resources/blog/september-2021/7-attacks-where-phishers-abused-legitimate-microsoft-services" rel="nofollow">all the times</a> where email attackers abused Azure, Sway, and other legitimate Microsoft services to phish victims’ details in recent years.</span></span></p> <p><span><span>For this attack attempt, the phishing site impersonated a Microsoft login page that also included the victim’s domain and email address. The purpose of this personalization was to convince the victim that nothing was wrong.</span></span></p> <h2><span><span><span><span><span>Defending against a Fake Microsoft Password Expiration Email</span></span></span></span></span></h2> <p><span><span>The attack campaign described above highlights the need for organizations to defend themselves against Microsoft-themed email attacks. One of the ways they can do that is by familiarizing their employees with what an email from their helpdesk will actually look like. They can complement that security awareness with a <a href="/products/email-threat-protection" rel="nofollow">multi-layered email security platform</a>.</span></span></p> Mon, 29 Nov 2021 21:00:52 +0000 admin 493 at Emotet’s at It Again! /resources/blog/november-2021/emotets-it-again <span>Emotet’s at It Again!</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 11/23/2021 - 15:13</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-11/emotet_detected.png" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Emotet has resumed operations nearly 10 months after an international coordinated action took control of the botnet’s infrastructure.</span></span></p> <h2><span><span><span><span><span>A Familiar Tactic</span></span></span></span></span></h2> <p><span><span>On November 15, the Ƶɫ | AppRiver team detected 221 email attack attempts from a revived Emotet botnet.</span></span></p> <p><span><span>Some of the instances scraped entire conversations, while others scraped the subject and sender. With those techniques, attackers granted themselves the ability to inject themselves into conversations involving individuals with whom the sender had already spoken. This increased the likelihood of the sender (now the recipient) following the attackers’ instructions.</span></span></p> <p><span><span>The commands themselves weren’t flashy. In one of their emails, the attackers asked the recipient to “please open the attached document.”  </span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-11/Picture3.jpg" width="1249" height="652" alt="Screenshot of one Emotet attack email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of one Emotet attack email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>Another instance came with the instruction to “Please see attached” as well as the offer of assistance should the recipient need anything more.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-11/Picture4.jpg" width="1224" height="640" alt="Screenshot of a second Emotet attack email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of a second Emotet attack email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>This isn’t the first time that malicious actors have used this tactic to distribute Emotet. Back in <a href="/resources/blog/may-2020/emotet-actors-use-conversation-hijacking-attack-deliver-qakbot" rel="nofollow">May 2020</a>, for instance, Ƶɫ | AppRiver flagged an email as part of a conversation hijacking attack involving a request for a trade reference and bank reference. Ultimately, the email used a .ZIP archive to deliver Qakbot, a common payload of Emotet.</span></span></p> <p><span><span>All the attack attempts detected by Ƶɫ | AppRiver arrived with Microsoft Excel spreadsheets, Microsoft Word documents, or password-protected .ZIP archives containing Word documents. Those files contained malicious macros that, when enabled, dropped Emotet.</span></span></p> <p><span><span>Upon execution, Brad Dunction at the <a href="https://isc.sans.edu/forums/diary/Emotet+Returns/28044/" rel="nofollow">SANS Internet Storm Center</a> spotted something familiar.</span></span></p> <p><span><span>“Infection traffic for Emotet is similar to what we saw before the takedown in January 2021,” explained in a blog post. “The only real difference is Emotet post-infection C2 is now encrypted HTTPS instead of unencrypted HTTP. My infected lab host turned into a spambot trying to push out more Emotet malspam.”</span></span></p> <p><span><span>Things didn’t slow down with Emotet after November 15. The following day, Ƶɫ | AppRiver detected 1,819 attack attempts involving the botnet. Those instances then fell to 665 on November 17.</span></span></p> <h2><span><span><span><span><span>A Familiar Friend Lent Some Help</span></span></span></span></span></h2> <p><span><span>Just as a bit of recap, law enforcement agencies in the Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, Canada, and Ukraine with international activity coordinated by <a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action" rel="nofollow">Europol</a> and Eurojust announced the seizure of Emotet’s infrastructure in January 2021. The botnet went quiet for 10 months after that.</span></span></p> <p><span><span>So, how did the botnet come back online?</span></span></p> <p><span><span>Per <a href="https://www.bleepingcomputer.com/news/security/here-are-the-new-emotet-spam-campaigns-hitting-mailboxes-worldwide/" rel="nofollow">Bleeping Computer</a>, “active Trickbot infections began dropping the Emotet loader on already infected devices, rebuilding the botnet for spamming activity” in mid-November.</span></span></p> <p><span><span>Trickbot has an established history with Emotet. Back in <a href="/resources/blog/april-2019/attack-campaign-using-emotet-and-trickbot-deliver-ryuk-ransomware" rel="nofollow">April 2019</a>, security researchers spotted the trojan families working together to infect unsuspecting users with Ryuk ransomware.</span></span></p> <p><span><span>Emotet’s takedown didn’t slow down Trickbot, however. On the contrary, <a href="https://www.checkpoint.com/press/2021/october-2021s-most-wanted-malware-trickbot-takes-top-spot-for-fifth-time/" rel="nofollow">Check Point Research</a> wrote in October 2021 that Trickbot had remained at the top of its most wanted malware list for five months straight.</span></span></p> <h2><span><span><span><span><span>How to Respond to Emotet’s Return </span></span></span></span></span></h2> <p><span><span>Emotet’s reemergence highlights the need for organizations to strengthen their security against email-based attacks. One of the ways they can do that is by investing in their email security awareness training program. Through regular education modules, organizations can inform their employees about conversation hijacking and other attack techniques used by spammers.</span></span></p> <p><span><span>Organizations need to balance those human controls with technical security measures. Hence the need for a <a href="/products/email-threat-protection" rel="nofollow">multi-layered email security solution</a>. By scanning emails for malicious IPs and other threat indicators, organizations can automatically protect themselves against many email-based attacks—all while allowing legitimate correspondence to reach its intended destination.</span></span></p> Tue, 23 Nov 2021 21:13:33 +0000 admin 491 at Record-Setting DDoS Attack Highlights Malicious Actors’ Strategic Thinking /resources/blog/november-2021/record-setting-ddos-attack-highlights-malicious-actors-strategic <span>Record-Setting DDoS Attack Highlights Malicious Actors’ Strategic Thinking</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 11/09/2021 - 17:36</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-11/ddos.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>In mid-October, Microsoft revealed that it had succeeded in mitigating a 2.4 terabyptes-per-second (Tbps) distributed denial-of-service (DDoS) attack against its own infrastructure.</span></span></p> <p><span><span>The tech giant explained that the attack targeted an Azure customer in Europe back in August and that it lasted for over 10 minutes. During that period, traffic peaked for a short time at 2.4 Tbps. Microsoft documented two smaller traffic spikes at 0.55 Tbps and 1.7 Tbps after that, as reported by <a href="https://www.msn.com/en-us/money/other/microsoft-says-it-mitigated-the-largest-ddos-attack-ever-recorded/ar-AAPpIWb" rel="nofollow">MSN</a>.</span></span></p> <h1><span><span><span><span><span>What Is a DDoS Attack?</span></span></span></span></span></h1> <p><span><span>A DDoS attack is a type of operation where malicious actors use remote locations to target an organization’s online presence. It works by flooding a target’s websites and other public-facing infrastructure with HTTP requests and traffic. This can prevent legitimate users from accessing those resources, thereby disrupting the target’s business operations.</span></span></p> <p><span><span>What makes DDoS attacks effective is the fact that they abuse the functionality of networking equipment and services like routers for malicious ends. Here’s the <a href="https://www.comptia.org/content/guides/what-is-a-ddos-attack-how-it-works" rel="nofollow">Computing Technology Industry Association</a> (CompTIA) with how.</span></span></p> <p><span><span>“Sophisticated DDoS attacks don’t necessarily have to take advantage of default settings or open relays,” the trade association explained. “They exploit normal behavior and take advantage of how the protocols that run on today’s devices were designed to run in the first place. In the same way that a social engineer manipulates the default workings of human communication, a DDoS attacker manipulates the normal workings of the network services we all rely upon and trust.”</span></span></p> <p><span><span>These types of events aren’t rare—especially not this year. According to <a href="https://venturebeat.com/2021/10/06/atlas-vpn-ddos-attacks-expected-to-reach-11m-by-end-of-2021/" rel="nofollow">VentureBeat</a>, security researchers documented 972,000 DDoS attacks in January 2021. That’s higher than any other month on record. By June, the volume of campaigns had dropped to 759,000. But that didn’t prevent an increase of 11% for DDoS attacks during the first half of the year compared to H1 2020, totaling 5.4 million. VentureBeat went on to note that DDoS attacks could reach a record-setting 11 million by December if the trend in H1 2021 continues for the rest of the year.</span></span></p> <h1><span><span><span><span><span>Putting DDoS Attacks into Context</span></span></span></span></span></h1> <p><span><span>DDoS attacks can be standalone incidents. But they don’t have to be. Take email bombs for example. This type of operation targets an inbox with a flood of emails. Those messages aren’t malicious; they don’t contain embedded links or attachments that contain malware or that redirect victims to a phishing page. But they do serve an important function for attackers.</span></span></p> <p><span><span>David Picket, senior cybersecurity analyst at <a href="https://appriver.com/blog/email-bombs-disguise-fraudulent-activity" rel="nofollow">AppRiver</a>, explains how.</span></span></p> <p><span><span>“The bomb is typically designed to distract the user from emails generated due to fraudulent purchases or financial account updates or transactions,” Pickett pointed out. “During these type of attacks, we've observed fraudulent airline ticket purchases, Apple store orders, and quite a few Best Buy pickup orders. If applicable to the fraudulent purchase ­- such as a Best Buy pickup order, attackers have mules ready to quickly pick up the fraudulently purchased merchandise soon after the attack begins.”</span></span></p> <p><span><span>Digital fraudsters aren’t the only ones who have been known to use DDoS attacks as part of their operations. According to <a href="https://www.bleepingcomputer.com/news/security/fbi-hellokitty-ransomware-adds-ddos-attacks-to-extortion-tactics/" rel="nofollow">Bleeping Computer</a>, the HelloKitty ransomware gang began leveraging DDoS attacks as another extortion-based tactic in the beginning of November. This involves targeting an organization’s public-facing website with a DDoS attack if the victim doesn’t respond quickly enough or doesn’t pay the demanded ransom.</span></span></p> <h1><span><span><span><span><span>How to Defend Against DDoS Attacks</span></span></span></span></span></h1> <p><span><span>In its documentation, <a href="https://docs.microsoft.com/en-us/compliance/assurance/assurance-microsoft-dos-defense-strategy" rel="nofollow">Microsoft</a> explains that it uses its global presence and engagement with Internet providers, private corporations, and other security firms to defend against network-based DDoS attacks. Those partners include Ƶɫ, which complements Microsoft’s focus on productive and performance with email threat protection. Click <a href="/amplify/smb/" rel="nofollow">here</a> to learn more about how this layered security approach can help to defend your organization against DDoS attacks and other threats.</span></span></p> Tue, 09 Nov 2021 23:36:05 +0000 admin 486 at 3 Recent Attacks Where Phishers Abused Google’s Services /resources/blog/november-2021/3-recent-attacks-where-phishers-abused-googles-services <span>3 Recent Attacks Where Phishers Abused Google’s Services</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 11/03/2021 - 15:14</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-11/google_tablet_keyboard.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>In a <a href="/resources/blog/september-2021/7-attacks-where-phishers-abused-legitimate-microsoft-services" rel="nofollow">recent blog post</a>, I discussed seven instances in which digital attackers abused Microsoft to launch phishing campaigns in recent years. The reality is that Microsoft is just one of the many companies targeted by phishers. Email attackers misuse the services of others, too. </span></span></p> <h2><span><span><span><span><span>Take Google as an Example</span></span></span></span></span></h2> <p><span><span>Attackers have a history of abusing Google’s services. Back in May 2020, for instance, <a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/phishing-in-a-bucket-utilizing-google-firebase-storage/" rel="nofollow">Trustwave SpiderLabs</a> detected multiple phishing attempts abusing Google Firebase, a mobile and web application development platform which provides secure uploads and downloads for supported apps. Some of those attack attempts used the pandemic and Internet banking as lures to trick victims into clicking on a fake vendor payment form that redirected them to a phishing page hosted on Firebase Storage. Others used an Office 365 phishing lure to redirect victims to an Office 365 phishing page hosted on Firebase.</span></span></p> <p><span><span>Several months after that, <a href="https://threatpost.com/google-forms-abused-to-phish-att-credentials/160957/" rel="nofollow">Threatpost</a> reported on a campaign in which digital attackers used Google Forms to create phishing landing pages masquerading as the login pages for more than 25 different entities. Security researchers detected a total of more than 250 different pages created using Google Forms as part of the campaign. More than 70% of those fake login pages impersonated AT&T, while the others claimed to belong to various financial organizations, collaboration apps, and government agencies.</span></span></p> <p><span><span>It was about a month later when <a href="/resources/blog/december-2020/attackers-sending-out-phishing-emails-universities-official-edu" rel="nofollow">Ƶɫ | AppRiver</a> detected an email that came from someone named “Diana.” Using the subject line “Re-validation,” the message claimed to be official correspondence from Microsoft Exchange requiring recipients to upgrade to the “latest e-mail Outlook Web Apps 2020.” The email contained an “UPGRADE” link that, when clicked, redirected victims to a file hosted via Google Docs and disguised as an OWA login portal. </span></span></p> <h2><span><span><span><span><span>Google’s Upcoming 2SV Auto-Enroll Drive</span></span></span></span></span></h2> <p><span><span>In response to the attacks discussed above, among others, Google is taking steps to protect its users. One of its most recent initiatives involves an effort to auto-enroll 150 million users accounts into its two-step verification (2SV) feature. As part of that drive, the tech giant announced its intention to require two million YouTube creators to turn on the feature, as well.</span></span></p> <p><span><span>“We also recognize that today’s 2SV options aren’t suitable for everyone, so we are working on technologies that provide a convenient, secure authentication experience and reduce the reliance on passwords in the long-term,” Google explained in a <a href="https://blog.google/technology/safety-security/making-sign-safer-and-more-convenient/" rel="nofollow">blog post</a>. “Right now we are auto-enrolling Google accounts that have the proper backup mechanisms in place to make a seamless transition to 2SV. To make sure your account has the right settings in place, take our quick <a href="https://myaccount.google.com/security-checkup/3" rel="nofollow">Security Checkup</a>.”</span></span></p> <h2><span><span><span><span><span>How to Defend Against Email Attacks Abusing Google</span></span></span></span></span></h2> <p><span><span>Organizations can take several steps to defend themselves against email attacks abusing the services of Google and other tech providers. First, they can use security awareness training to educate their users about new email attacks. They can also highlight the point that Google intends to “auto-enroll” users into its 2SV feature, which means they won’t have to do anything on their end. As such, organizations can educate employees to be wary of emails that disguise themselves as Google informing recipients that they need to activate 2FA on their accounts.</span></span></p> <p><span><span>That’s not all organizations can do. They can also emphasize the importance of users logging into their web accounts by visiting a website directly, suggest that employees proactively enroll in 2FA schemes on whichever accounts they can, and avoid clicking on links embedded in emails. Finally, they can use a <a href="/products/email-threat-protection" rel="nofollow">security solution to scan incoming emails on multiple layers</a>. </span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 03 Nov 2021 20:14:58 +0000 admin 484 at Phishers Impersonating Maersk Line to Steal Victims’ Email Credentials /resources/blog/november-2021/phishers-impersonating-maersk-line-steal-victims-email-credentials <span>Phishers Impersonating Maersk Line to Steal Victims’ Email Credentials</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 11/02/2021 - 11:08</span> <a href="/resources/blog/threat-alert" hreflang="en">Threat Alert</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-11/maersk_2.jpg" width="1485" height="805" alt="Screenshot of the phishing landing page. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Phishers launched an attack campaign in which they impersonated Danish international container shipping company Maersk Line to steal victims’ email account credentials.</span></span></p> <h2><span><span><span><span><span>“Confirmation of Shipping Invoice” Scam</span></span></span></span></span></h2> <p><span><span>At the end of October, the Ƶɫ | AppRiver team flagged an email that appeared to have originated from Maersk Line</span></span></p> <p><span><span>Those responsible for the campaign used stolen branding to impersonate the shipping giant. They even included the text “Best Global shipping company” in their message. As noted by <a href="https://www.fleetmon.com/maritime-news/2013/1535/maersk-line-won-two-awards-afsca-2013/" rel="nofollow">FleetMon</a>, Maersk Line won this exact distinction for at least 20 consecutive years at the Asian Freight & Supply Chain Awards (AFSCA).</span></span></p> <p><span><span>Even so, the attackers slipped up a few times in their email. </span></span></p> <p><span><span>First, they used inconsistent capitalization with “Best Global shipping company,” “Original copy of Shipping Docs,” and even the subject line “Confirmation of shipping Invoice,BL & Parking List [sic].” These errors might have raised a recipient’s suspicions.</span></span></p> <p><span><span>Second, they used spoofing techniques to trick the recipient into thinking the email came from “Maersk Global Shipping,” with the sending email address “noreply@maersklineshipping[dot]com.” But that’s not a legitimate Maersk Line email address. Official correspondence from the shipping giant uses the domain “@maersk.com.”</span></span></p> <p><span><span>Finally, the attackers included a signature block attributing their email to Mark Rosario of MaerskLine China. There appears to be a Mark Rosario who does work at Maersk. But according to this individual’s LinkedIn profile, he’s been associated with the company’s operations in Pakistan for over 20 years, not China.</span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-11/maersk_1.jpg" width="1040" height="917" alt="Screenshot of the fake Maersk Line email. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the fake Maersk Line email. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span>The email instructed the recipient to view some original documents including an invoice, bill of lading, and packing list by clicking on an embedded “Download Confirmation” button.</span></span></p> <p><span><span>Troy Gill, manager of security research at Ƶɫ | AppRiver, explains what happened next.</span></span></p> <p><span><span><span>“If the user complies, they are directed to a very convincing phishing page located on labour.go[.]th,” he said. “The page cycles through different realistic-looking Maersk backgrounds with a sign-in screen overlayed to steal the users email credentials.”</span></span></span></p> <p> </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2021-11/maersk_2.jpg" width="1485" height="805" alt="Screenshot of the phishing landing page. (Source: Ƶɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the phishing landing page. (Source: Ƶɫ | AppRiver)</figcaption></figure><p> </p> <p><span><span><span>“Per whois DNS data, the domain itself appears to be a Thai government page managed by the Labour Protection and Welfare Department. We were also able to find that it has a history of over 3 years of being abused for phishing attacks, mostly Adobe themed in the past,” he added.</span></span></span></p> <h2><span><span><span><span><span>Putting This Attack into Context</span></span></span></span></span></h2> <p><span><span>The attack described above arrived amid ongoing global supply chain challenges caused by the pandemic. In June 2021, for instance, <a href="https://www.whitehouse.gov/cea/blog/2021/06/17/why-the-pandemic-has-disrupted-supply-chains/" rel="nofollow">The White House</a> explained that some industries had shrunk or closed in response to the events of 2020. Some businesses struggled to hire quickly enough as they tried to reopen, while others didn’t have enough inventory to immediately resume their previous levels of business activity.</span></span></p> <p><span><span>These events help to explain why 36% of small businesses reported delays with domestic suppliers, according to a U.S. Census Small Business Pulse survey cited by The White House. It also helps to put other events such as abrupt price increases, shortages, and digital attack campaigns impersonating shipping companies into perspective.</span></span></p> <p><span><span>“With so many shipping delays and supply shortages around the world, threat actors are eager to spoof logistics and supply chain companies hoping for an easy compromise,” Gill clarified.</span></span></p> <p><span><span>Attacks such as the one discussed above didn’t begin with the pandemic, however. Back in May 2019, for example, <a href="https://www.maersk.com/news/articles/2019/05/16/maersk-employees-impersonated-in-phishing-scam" rel="nofollow">Maersk</a> published an article warning of a phishing scam where fraudsters used genuine Maersk employee names and positions when contacting customers to trick them into clicking on a link, downloading an attachment, and/or authenticating their information. </span></span></p> <p><span><span>Such activity highlights the need for organizations to invest in employee security awareness training and invest in an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> capable of spotting new attack attempts.</span></span></p> Tue, 02 Nov 2021 16:08:28 +0000 admin 483 at