{"id":89586,"date":"2021-02-03T18:08:44","date_gmt":"2021-02-03T12:38:44","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89586"},"modified":"2023-06-20T16:54:28","modified_gmt":"2023-06-20T11:24:28","slug":"spear-phishing-targets-microsoft-to-amass-large-numbers-of-credentials","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/spear-phishing-targets-microsoft-to-amass-large-numbers-of-credentials\/","title":{"rendered":"Spear Phishing targets Microsoft to amass large numbers of credentials"},"content":{"rendered":"<p>We observed a considerable uptick in <a href=\"https:\/\/blogs.quickheal.com\/what-is-phishing-a-deep-dive-into-the-phishing-attack-mechanisms-with-tips\/\">Phishing Attacks<\/a> during the COVID-19 pandemic. During our analysis, we came across a Spear <a href=\"https:\/\/blogs.quickheal.com\/new-phishing-campaign-targets-google-play-developers\/\">Phishing Campaign<\/a> targeting high-profile individuals for credential harvesting. The emails that we analysed link to fake login pages mimicking Office 365 logins for the victim organizations.<\/p>\n<figure id=\"attachment_89589\" aria-describedby=\"caption-attachment-89589\" style=\"width: 439px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89589\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Phishing-attack-flow-1.jpg\" alt=\"Fig. 1 - Phishing attack flow \" width=\"439\" height=\"336\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Phishing-attack-flow-1.jpg 439w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Phishing-attack-flow-1-300x230.jpg 300w\" sizes=\"(max-width: 439px) 100vw, 439px\" \/><figcaption id=\"caption-attachment-89589\" class=\"wp-caption-text\">Fig. 1 &#8211; Phishing attack flow<\/figcaption><\/figure>\n<p>Here is the technical analysis of a few of these Spear Phishing emails:<\/p>\n<h2>Tax-invoice mail<\/h2>\n<p>Instances of malicious emails sent to high-value targets consisting of genuine-looking <strong>Tax-invoice(s)<\/strong> marked as confidential were observed in this campaign. This communication includes COVID-19 related information and senders\u2019 details \u2014 the latter pretends to be CEO of a bank from an east African country. However, the corresponding domain name is spoofed as the targeted user\u2019s organization\u2019s finance department (blurred in red) in an attempt to make the email appear as legitimate as possible.<\/p>\n<figure id=\"attachment_89590\" aria-describedby=\"caption-attachment-89590\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89590\" style=\"text-align: center;\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Email-Fake-tax-ivoice-650x268.jpg\" alt=\"Fig. 2 - Fake Tax Invoice email\" width=\"650\" height=\"268\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Email-Fake-tax-ivoice-650x268.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Email-Fake-tax-ivoice-300x124.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Email-Fake-tax-ivoice-768x317.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Email-Fake-tax-ivoice-789x325.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Email-Fake-tax-ivoice.jpg 973w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89590\" class=\"wp-caption-text\">Fig. 2 &#8211; Fake Tax Invoice email<\/figcaption><\/figure>\n<p>In the image above, the domain <strong>\u2018tld\u2019<\/strong> in the \u2018sent from\u2019 indicates that is related to the African country of <strong>Malawi<\/strong>.<\/p>\n<p>A malicious URL is embedded in the call to action in this email as seen below &#8211;<\/p>\n<p><strong><em>https[:]\/\/AAAA[.]israelandamerica[.]com\/95125?[base64-encoded-targetID]=&amp;&amp;mic#73747?xxxx=xxxx=<\/em><\/strong><\/p>\n<p>This URL contains the targeted user organization name (AAAA) as sub-string &amp; target victim email ID in base64 encoded format.<\/p>\n<p>When the targeted user clicks on open, it will redirect and land on a fake page with a different URL as shown below. The fake phishing page looks exactly like Microsoft Office\u2019S Login Page. Redirected URL can have targeted user organization\u2019s sub-string to make the user believe about the legitimacy of the website.<\/p>\n<p>Targeted email Id is rendered from embedded URLs as base64 encoded.<\/p>\n<figure id=\"attachment_89591\" aria-describedby=\"caption-attachment-89591\" style=\"width: 528px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89591\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Landing-fake-page-528x390.jpg\" alt=\"Fig. 3 \u2013 Fake Landing Page\" width=\"528\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Landing-fake-page-528x390.jpg 528w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Landing-fake-page-300x222.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Landing-fake-page.jpg 675w\" sizes=\"(max-width: 528px) 100vw, 528px\" \/><figcaption id=\"caption-attachment-89591\" class=\"wp-caption-text\">Fig. 3 \u2013 Fake Landing Page<\/figcaption><\/figure>\n<p>In the below image, organizational (blurred) sub-string are present along with the logo of the organization with the target\u2019s email ID.<\/p>\n<figure id=\"attachment_89592\" aria-describedby=\"caption-attachment-89592\" style=\"width: 558px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89592\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Password-Field-558x390.jpg\" alt=\"Fig.4 - Password field\" width=\"558\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Password-Field-558x390.jpg 558w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Password-Field-300x210.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Password-Field.jpg 762w\" sizes=\"(max-width: 558px) 100vw, 558px\" \/><figcaption id=\"caption-attachment-89592\" class=\"wp-caption-text\">Fig.4 &#8211; Password field<\/figcaption><\/figure>\n<p>To make this look all the more genuine, the attacker also displays an important message for the targeted user.<\/p>\n<p>No matter what password is inputted, this step will always error out tricking the user into clicking \u2018reset password\u2019. Once, reset password clicked, It will open a similar login page with a new URL which includes encoded email ID to render.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_89616\" aria-describedby=\"caption-attachment-89616\" style=\"width: 580px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89616 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Wrong-password_01_Merge-2.jpg\" alt=\"Fig.5 - Password reset page\" width=\"580\" height=\"1114\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Wrong-password_01_Merge-2.jpg 580w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Wrong-password_01_Merge-2-156x300.jpg 156w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Wrong-password_01_Merge-2-203x390.jpg 203w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><figcaption id=\"caption-attachment-89616\" class=\"wp-caption-text\">Fig.5 &#8211; Password reset page<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>During traffic analysis, we found that entered password along with email ID is posted to a remote server in background traffic.<\/p>\n<figure id=\"attachment_89596\" aria-describedby=\"caption-attachment-89596\" style=\"width: 438px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89596\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Posting-Credentials-438x390.jpg\" alt=\"Fig.6 - Posting Credentials to the remote server\" width=\"438\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Posting-Credentials-438x390.jpg 438w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Posting-Credentials-300x267.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Posting-Credentials.jpg 455w\" sizes=\"(max-width: 438px) 100vw, 438px\" \/><figcaption id=\"caption-attachment-89596\" class=\"wp-caption-text\">Fig.6 &#8211; Posting Credentials to the remote server<\/figcaption><\/figure>\n<p>Targeted user\u2019s <strong>email\/password<\/strong> is sent with <strong>user\/pass<\/strong> parameters in POST request.<\/p>\n<p>TLS certificate for this domain has a short-term validity from 30-Dec-20 to 30-March-21 \u2014IPs 199.19.225.191 &amp; 20.37.247.74 are found &amp; associated with domains during analysis. The domain lifespan was short &amp; it also identified the multiple browser\/user agent after some attempts and redirects to normal websites with domain numerical sub string changes in each attempt.<\/p>\n<p>It is also identified that attacker to be targeting top-level officials from various organizations with encoded email Ids which appear like the attacker\u2019s \u2018Hitlist\u2019<\/p>\n<h2>Phishing email with Voice mail as an attachment<\/h2>\n<p>Similar phishing attempt was identified with embedded script in audio message emails as below. In this type of attack, the email contains a Japanese domain, mapped with the target organization\u2019s name which is \u2018CALLER\u2019 in this instance.<\/p>\n<figure id=\"attachment_89597\" aria-describedby=\"caption-attachment-89597\" style=\"width: 592px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89597\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Case2-Email.jpg\" alt=\"Fig.1 - Email from the attacker \" width=\"592\" height=\"277\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Email.jpg 592w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Email-300x140.jpg 300w\" sizes=\"(max-width: 592px) 100vw, 592px\" \/><figcaption id=\"caption-attachment-89597\" class=\"wp-caption-text\">Fig.1 &#8211; Email from the attacker<\/figcaption><\/figure>\n<p>The script embedded in the mail had hex-encoded code with an URL that lands to a <a href=\"https:\/\/blogs.quickheal.com\/what-is-phishing-a-deep-dive-into-the-phishing-attack-mechanisms-with-tips\/\">phishing site<\/a>.\u00a0Hidden parts contain base64 encoded in targeted user email ID.<\/p>\n<figure id=\"attachment_89599\" aria-describedby=\"caption-attachment-89599\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89599\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Case2-Hex-Encoded-1-650x79.jpg\" alt=\"Fig.2 - Hex encoded script \" width=\"650\" height=\"79\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Hex-Encoded-1-650x79.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Hex-Encoded-1-300x36.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Hex-Encoded-1-768x93.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Hex-Encoded-1-789x95.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Hex-Encoded-1.jpg 1300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89599\" class=\"wp-caption-text\">Fig.2 &#8211; Hex encoded script<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_89600\" aria-describedby=\"caption-attachment-89600\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89600\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Case-2-DecodedScript-650x109.jpg\" alt=\"Fig.3 - Decoded script\" width=\"650\" height=\"109\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case-2-DecodedScript-650x109.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case-2-DecodedScript-300x50.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case-2-DecodedScript-768x129.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case-2-DecodedScript-789x132.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case-2-DecodedScript.jpg 984w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89600\" class=\"wp-caption-text\">Fig.3 &#8211; Decoded script<\/figcaption><\/figure>\n<p>In the above-decoded script, <a href=\"https:\/\/www.seqrite.com\/blog\/conduct-phishing-simulation-tests-to-keep-employees-alert\/\">phishing<\/a> URL can be seen wherein the parameter <strong>\u201ce\u201d<\/strong> contains the base64 encoded value of the target user\u2019s email id. Once the above script is executed, the user gets redirected to a phishing page.<\/p>\n<figure id=\"attachment_89601\" aria-describedby=\"caption-attachment-89601\" style=\"width: 424px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89601\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Case2-reCaptcha.jpg\" alt=\"Fig.4- reCaptcha validation\" width=\"424\" height=\"123\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-reCaptcha.jpg 424w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-reCaptcha-300x87.jpg 300w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><figcaption id=\"caption-attachment-89601\" class=\"wp-caption-text\">Fig.4- reCaptcha validation<\/figcaption><\/figure>\n<p>In the image below, we can see a fake Office 365 landing page with the organization\u2019s logo. Email ID of the target user is rendered from encoded script URL parameter value.<\/p>\n<figure id=\"attachment_89604\" aria-describedby=\"caption-attachment-89604\" style=\"width: 574px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89604\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Case2-Fake-Creadential-page-574x390.png\" alt=\"Fig.5 - Fake credential input page\" width=\"574\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Fake-Creadential-page-574x390.png 574w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Fake-Creadential-page-300x204.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Fake-Creadential-page-768x522.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Fake-Creadential-page.png 781w\" sizes=\"(max-width: 574px) 100vw, 574px\" \/><figcaption id=\"caption-attachment-89604\" class=\"wp-caption-text\">Fig.5 &#8211; Fake credential input page<\/figcaption><\/figure>\n<p>After entering the password, It gives an error for the 1st attempt \u2014 it would show validation success message then redirect voice audio clip. The credentials would be posted to a remote server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89617 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/02\/Case2-Wrong-Password_Merge-1-650x232.jpg\" alt=\"\" width=\"650\" height=\"232\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Wrong-Password_Merge-1-650x232.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Wrong-Password_Merge-1-300x107.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Wrong-Password_Merge-1-768x274.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Wrong-Password_Merge-1-789x282.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/02\/Case2-Wrong-Password_Merge-1.jpg 904w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The audio clip is a short mp3 message regarding a request to call. Re-attempt for main kfd-d0k[.]club may lead to normal websites. Subdomains are related to Latin America with a short lifespan and TLS certificates are also valid for a few months.<\/p>\n<p>\u201c<em>To execute <strong>spear phishing<\/strong> attacks, malicious vectors would have the list of target email Ids and organizational details. Exploitation attempts can be initiated via emails\/IM or any other methods with embedded scripts\/URLs. The end goal of attackers is to harvest the credentials of the high-value individuals to disturb the organizations, lead to scams, steal critical information, etc<\/em><em>.<\/em><\/p>\n<h2>Tips to spot phishing attacks<\/h2>\n<p>&nbsp;<\/p>\n<p><strong>Validate Email Sender details<\/strong>: Validate the sender&#8217;s email ID &amp; names to check Impersonation.<\/p>\n<p><strong>Check Subject Line<\/strong>:\u00a0 Check for words like urgency, Important &amp; financial nature in the subject line.<\/p>\n<p><strong>Verify the Links and Attachments<\/strong>: Check legitimacy by hovering over the links, scan the attachments.<\/p>\n<p><strong>Message Content &amp; Email format<\/strong>:\u00a0 Carefully read the nature of the email, intention, check grammatical errors &amp; visual style and verify email signature.<\/p>\n<h3>Subject Matter Experts<\/h3>\n<p><strong>Prashant Tilekar<\/strong><\/p>\n<p><strong>Shiv Mohan<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We observed a considerable uptick in Phishing Attacks during the COVID-19 pandemic. During our analysis, we came across a Spear Phishing Campaign targeting high-profile individuals for credential harvesting. The emails that we analysed link to fake login pages mimicking Office 365 logins for the victim organizations. Here is the technical analysis of a few of [&hellip;]<\/p>\n","protected":false},"author":84,"featured_media":89619,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1772],"tags":[72,1773,365],"class_list":["post-89586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spear-phishing","tag-microsoft","tag-office-365","tag-spear-phishing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89586"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89586"}],"version-history":[{"count":12,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89586\/revisions"}],"predecessor-version":[{"id":91530,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89586\/revisions\/91530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89619"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}