Phishing targeting users on work devices is not slowing down over the summer, with many employees taking their laptops home for the summer vacation months. The second half of July saw a pronounced surge in Microsoft and Outlook spearphish that demonstrated a number of interesting tactics, including multi-factor authentication phishing kits and distributed phishing content hosted across multiple trusted CDN servers. The same period also saw an increase in phishing pages targeting consumer banking services like Bank of America and American Express. MFA phishing included options to phish SMS codes as well as authentication app codes. Below are some examples and highlights.
cure[.]ru[.]com/Gr6t/
jzma[.]izpes[.]es
andrealong0510[.]blob[.]core[.]windows[.]net
amuricanxpress[.]com
login[.]officekeydesk[.]top
secure-en[.]com
my-php-app-production-cf6c[.]up[.]railway[.]app
chyisieaa[.]z20[.]web[.]core[.]windows[.]net
scalper[.]stackengine[.]sa[.]com
On July 16, a user at a Kentucky organization clicked the below Microsoft spearphish.
The page was hosted on a reputable hosting service, leveraging its good DNS reputation. The page also included a multi-stage credential harvest, offering the victim multiple MFA options like SMS and authenticator code.
On July 18, a Texas user clicked the below Microsoft scareware phishing attack.
This scam site fingerprints the target device, using their IP, geo-location and browser details, to customize the popup. It then “locks” the browser with coercive tricks, including auto-playing alarm sounds—so the user feels trapped. Finally, a counterfeit Windows-Defender dashboard runs a fake quick-scan and flashes red warnings, all designed to convince victims their PC is infected and prod them into calling the fake support number.
On July 18th, a user at a Kentucky organization clicked the below Microsoft spearphish.
In order to evade detection, the page source is uploaded across several trusted CDN servers, like AWS, Akamai and Fastly, rather than being hosted on a single phishing server. Adding to its conviction, the page carefully mirrors Microsoft’s authentication flow.
On July 22, an employee at a Florida organization clicked the below MIcrosoft phishing attack.
The URL loads behind a Cloudflare Captcha to avoid automated scanners. The phishing server blocks requests from non-browser user agents to further evade detection mechanisms.
On July 21, an employee at a Kentucky organization clicked the below Outlook phishing attack in a document share application.
The phishing attack includes buttons for Outlook, Office 365, Yahoo, AOL, and “Other Mail. It further includes a one time password pop up to intercept a 6 digit code SMS or authenticator code in real time, enabling full session hijack. Later that day, another employee clicked on the below Microsoft phishing attack.
The page included an encrypted payload to hide from static scanners and clip board hijacking to thwart incident response efforts.
On July 30, an employee at a Georgia organization clicked the below Microsoft phishing attack.
The page also used tools to avoid automated analysis and block manual inspection.
The same period saw a marked increase in phishing attacks targeting Bank of America and American Express customers on their work devices. Below are a couple of examples.
On July 17, an employee at a Kentucky organization clicked the below Bank of America phishing attack.
This is a pixel perfect replica of the Bank of America login page. It included a secondary stage prompting the user for a 2FA code, SSN, or other security questions after credentials.
On July 23, a user at another Georgia organization clicked the below American Express phishing attack.
The user was prompted by an email or text message saying “Fraud alert on your Amex card – log in here to verify”. The URL also targets users via typo-squatting and includes user tracking parameters.