ThreatLabZ, the Zscaler threat research team, recently observed a new series of Microsoft-themed phishing attacks aimed at senior-level employees at multiple organizations. The Zscaler cloud has blocked over 2,500 of these phishing attempts over the last three months. The attack is notable for its targeted aim at senior business leaders with titles such as Vice President and Managing Director who are likely to have a higher degree of access to sensitive company data. The aim of these campaigns is to steal these victims’ login credentials to allow threat actors access to valuable company assets.
Attacks have been spread across a range of industries, with the heaviest activity in the banking and IT sectors. We are unable to attribute these attacks to any particular threat actor at this time.
In these attacks, victims receive what appears to be automated emails from their unified communications tools indicating that they have a voicemail attachment. When they click the attachment, victims encounter a fake Google reCAPTCHA screen, and then are directed to what appears to be a Microsoft login screen, allowing threat actors to steal their login credentials. The phishing pages are hosted by using .xyz, .club and .online generic top level domains (TLDs).
Fig 1: The phishing hits observed in our Zscaler cloud over eleven weeks (.xyz, .club and .online)
ThreatLabZ discovered these phishing URLs in our Threat Intelligence framework, and additionally received several submissions to the ThreatLabZ URL risk analyzer tool. Similar phishing campaigns utilizing fake Google reCAPTCHAs have been observed for several years, but this specific campaign targeting executives across specific industry verticals started in December 2020.
In this blog, we break down the full attack cycle of the Microsoft phishing campaigns hosted using the .xyz, .club and .online generic TLDs, and include a full list of the phishing domains that were observed. We have also included a chart breaking down the number of attacks by industry and by title to shed more light on the impact of this campaign.
.xyz TLD phishing campaign:
In the .xyz TLD phishing attacks, threat actors send a spam email addressed from a unified communications system with an attached HTML file that is purported to be a voicemail message.
Fig 2:The spam mail with HTML file attachment.
The following figure shows the content of the HTML file with a phishing URL server[.]mvmail365office[.]xyz.
Fig 3: The source code of the attached HTML file vmail-219.HTM.
Once the victim opens the attached HTML file, it redirects the user to the .xyz phishing domain which is disguised as a legitimate Google reCAPTCHA page in order to trick the users.
Fig 4: The fake Google reCAPTCHA page.
Fig 5: The source code of the fake Google reCAPTCHA page.
Once Google reCAPTCHA “verifies” the user, it redirects the user to the fake Microsoft login phishing page.
Fig 6: The fake Microsoft login screen.
Fig 7: The actual content of the fake Microsoft phishing page.
After giving the login credentials, the phishing campaign will show a fake message that says “Validation successful.” Users are then shown a recording of a voicemail message that they can play, allowing threat actors to avoid suspicion.
Fig 8: The fake Microsoft account validation page.
Fig 9: The post-infection traffic captured in Fiddler.
Fig 10: Fake voice message directed from the phishing campaign.
Fig 11: The overall web traffic of the Microsoft phishing campaign captured in Fiddler.
.club TLD phishing campaign:
Similar to the .xyz TLD campaign, the .club TLD phishing campaign begins with the attackers sending spam mail with an attached HTML file addressed from a unified communications system. It then follows with a fake Google reCAPTCHA, fake Microsoft login screen, and ends by showing the user a hosted .PDF file.
Fig 12:The spam mail with attached HTML file ATT34698.HTM.
The following image shows the obfuscated content of the attached HTML file.
Fig 13: The obfuscated content of the attached HTML file.
Fig 14: The de-obfuscated content of the HTML file with the phishing URL.
In this instance, the hosted phishing campaign used the domain volp[.]makersvlib[.]club with the fake Google reCAPTCHA method.
Fig 15: The fake Google reCAPTCHA page uses the .club TLD domain.
Fig 16: The fake Microsoft phishing campaign volp[.]makersvlib[.]club.
Fig 17: The fake PDF file hosted displayed post credential theft.
Fig 18: The overall web traffic of the hosted phishing campaign using .club TLD domain.
.online TLD phishing campaign:
In the .online phishing campaign, the threat actors send users a PDF file with the attached phishing campaign link secure[.]nealrose-lawofficerecords[.]online along with a directive that says “REVIEW SECURE DOCUMENT.” Once the user clicks the file, they are redirected to a fake Google reCAPTCHA followed by a fake Microsoft login screen; post-compromise they are redirected to a Google.com search page.
Fig 19: Spam PDF file redirects to the phishing campaign secure[.]nealrose-lawofficerecords[.]online
Fig 20: The fake Google reCAPTCHA page uses the .online TLD domain.
Fig 21: The fake Microsoft phishing campaign(secure[.]nealrose-lawofficerecords[.]online).
Fig 22: The final destination page (Google.com) after compromise.
Fig 23: The overall web traffic of the hosted phishing campaign using .online TLD domain
The Zscaler cloud blocked more than 2,500 targeted Microsoft-themed phishing attacks over the past three months that were hosted using the generic TLD (.xyz, .club, .online) domains.
The following diagram represents the top industries targeted by this phishing campaign, based on ThreatlabZ analysis:
Fig 24: Percentage of detected phishing hits observed by industry in the Zscaler cloud.
Fig 25: Here is the distribution of the targeted employee designations.
.xyz TLD phishing domains:
.club TLD phishing domains:
.online TLD phishing domains:
*** This is a Security Bloggers Network syndicated blog from Blog Category Feed authored by Gayathri Anbalagan. Read the original post at: https://www.zscaler.com/blogs/security-research/microsoft-themed-phishing-attack-targets-executives-using-fake-google