fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Office 365 Phishing Campaign Detects Sandboxes To Evade Detection

Office 365 Phishing Campaign Detects Sandboxes To Evade Detection

Microsoft is tracking an ongoing Office 365 phishing campaign that makes use of several methods to evade automated analysis in attacks against enterprise targets.

“We’re tracking an active credential phishing attack targeting enterprises that uses multiple sophisticated methods for defense evasion and social engineering,” Microsoft said.

“The campaign uses timely lures relevant to remote work, like password updates, conferencing info, helpdesk tickets, etc.”

Custom subdomains and automated redirection to legitimate domains

One of the evasion tactics utilized in this credential theft attack is the use of redirector URLs with the capability to detect incoming connections from sandbox environments commonly used by security researchers to gain more info about the attack.

Also Read: Limiting Location Data Exposure: 8 Best Practices

Once such a connection is detected, the redirector will switch from sending the potential victims to a phishing landing page to redirecting any automated analysis attempts to legitimate sites.

This allows the phishers to make sure that their phishing pages will only be visited by real users, thus drastically lowering the chance of getting their attacks blocked and increasing the odds of real people being lured to their phishing sites.

The phishing emails used in this campaign are also heavily obfuscated to make sure that secure email gateways will not be able to detect the malicious messages and automatically block them before they land in the targets’ inboxes.

Phishing email samples
Phishing email samples (Microsoft)

This campaign is also generating custom subdomains to use with redirector sites for each of the targets as a method to make the phishing URLs more believable in the eyes of the targets and thus boost the attacks’ success rate.

These subdomains are created using several formats but they will almost always contain the target’s username and their organization’s domain name.

“This unique subdomain is added to a set of base domains, typically compromised sites,” Microsoft explained. “Notably, the phishing URLs have an extra dot after the TLD, followed by the Base64-encoded email address of the recipient.”

“The unique subdomains also mean huge volumes of phishing URLs in this campaign, an attempt at evading detection.”

Display name patterns like “Password Update”, “Exchange protection”, “Helpdesk-#”, “SharePoint”, and “Projects_communications” are also used as a social engineering lure to increase the likeliness that the targets will give in and click the phishing URLs embedded within each email.

Custom subdomain generation pattern
Custom subdomain generation pattern (Microsoft)

Innovative evasion tactics

Earlier this month another Office 365 phishing campaign was detected while inverting images used as backgrounds for landing pages to avoid getting flagged as malicious by web crawling engines used to spot phishing sites.

The phishing kit designed to use that novel tactic automatically reverts the backgrounds using Cascading Style Sheets (CSS) to revert to the original backgrounds of the Office 365 login pages they’re trying to mimic.

Also Read: 10 Practical Benefits of Managed IT Services

This way, phishing targets that get redirected to one of these landing pages will see the original background instead of the inverted image backgrounds that the web crawlers get served with.

Previous phishing campaigns targeting Office 365 users also used innovative tactics such as abusing Google Ads to circumvent secure email gateways, using cloud services such as Google Cloud ServicesMicrosoft Azure, Microsoft Dynamics, and IBM Cloud to host phishing landing pages, as well as testing the stolen login in real-time.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us