WeTransfer used to host phishing redirectors | xxxWeTransfer used to host phishing redirectors – xxx
菜单

WeTransfer used to host phishing redirectors

七月 25, 2019 - BleepingComputer

WeTransfer used to host phishing redirectors

A phishing campaign using WeTransfer notifications as surrogates for the run-of-the-mill malicious URLs usually employed in these type of attacks was recently detected while successfully bypassing email gateways developed by Microsoft, Proofpoint, and Symantec.

WeTransfer is a cloud-based file hosting and transferring service, with support for hosting and sharing files of up to 2 GB for the free tier and up to 20 GB for the paid Plus service.

The phishing attacks observed by security researchers at the Cofense Phishing Defense Center targeted a wide range of high profile entities from industries such as media and banking.

Legitimate WeTransfer ‘shared files’ notifications were embedded within the phishing messages that landed in the targets inboxes, with the WeTransfer links helping the emails evade the gateway’s malicious content detection algorithm. 

“The attackers utilise what appears to be compromised email accounts to send a genuine link to a WeTransfer hosted file,” researchers discovered. 

WeTransfer used to host phishing redirectors
Phishing email sample

WeTransfer used to host phishing redirectors

To make the WeTransfer notification look more convincing, the threat actors added custom notes to the phishing emails, often choosing to camouflage them as invoices ready to be reviewed.

This is a very popular phishing tactic designed to lower the targets’ guard and taking advantage of the drop in vigilance as they open links they otherwise wouldn’t even consider clicking.

After the victims click on the “Get your files” button at the bottom of the WeTransfer notification — which passes all the security checks with flying colors — they will get “redirected to the WeTransfer download page where a HTM or HTML file is hosted and thus downloaded by the unsuspecting victim.”

WeTransfer used to host phishing redirectors
WeTransfer hosting page

Once the downloaded HTML file is opened, the phishing landing page will be opened in the victims’ default web browser as part of the final stage of the attack designed to trick them into giving away their credentials for Office 365 and various other online services.

“As WeTransfer is a well-known and trusted file hosting system, used to share files too large to attach to an email, these links will typically bypass gateways as benign emails, unless settings are modified to restrict access to such file sharing sites,” conclude the Cofense researchers.

WeTransfer used to host phishing redirectors
Office 365 phishing landing page

High variety of baiting techniques

While monitoring the latest phishing attack trends, Cofense discovered several other active phishing campaigns employing a variety of techniques designed to steal their targets’ sensitive information.

For instance, just a week ago, phishers were seen using a base HTML element to hide the malicious URL from antispam solutions, a tactic that helped them circumvent the Office 365 Advanced Threat Protection (ATP) security checks and deliver their messages to inboxes of American Express customers.

A malspam campaign delivering fake eFax messages that would drop a banking Trojan and RAT cocktail via malicious Microsoft Word document attachments was observed during early July.

Cofense researchers unearthed another phishing campaign which abused QR codes in June that would redirect targets to phishing landing pages, effectively dodging security solutions and controls intended to stop such attacks in their tracks.

Related Articles:

Beware of Fake Microsoft OneNote Audio Note Phishing Emails

New Phishing Scam Asks You to Manage Your Undelivered Email

Phishing Email States Your Office 365 Account Will Be Deleted

Phishers Target Office 365 Admins with Fake Admin Alerts

Twitter Can be Tricked Into Showing Misleading Embedded Links

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51