Webmail provider selection menu | xxxWebmail provider selection menu – xxx
菜单

Webmail provider selection menu

八月 9, 2019 - BleepingComputer

Webmail provider selection menu

An ongoing phishing campaign targeting several organizations with the help of DocuSign branded spam e-mails has been observed by Proofpoint’s Threat Insight Team while abusing Amazon Web Services (AWS) to host their landing pages.

While various threat actors have been seen utilizing consumer-grade cloud storage such as Dropbox and Google Drive to host malicious content like malware payloads, phishers have also used it for other purposes like phishing kits hosting.

However, as Proofpoint found, some of the phishing actors they monitored throughout 2019 have slowly moved to “enterprise-class public cloud storage providers such as Amazon Web Services (AWS) and Microsoft Azure.”

Webmail provider selection menu
Phishing email sample

One of the phishing campaigns Proofpoint analyzed since the start of 2019 is still active and it uses spam e-mail and landing page templates featuring stolen DocuSign branding.

The phishers use nested JavaScript encoding for the landing pages hosted on Amazon S3 storage for evading detection and for hindering analysis, with the Multibyte XOR encoding technique described by Proofpoint in February 2016 being an integral part of the process.

Webmail provider selection menu

The phishing kit used in this campaign features a drop-down menu to allow the targets to choose the e-mail provider they want to log into, with a “Sign in to view attachment” button being used to trick them into entering their credentials.

“After trying to get the credentials on this page, if the visitor enters their information on the DocuSign landing page, they will then be redirected to a lookalike of the webmail service they indicated, and another phishing landing will try to steal the credentials for a second time,” adds Proofpoint’s report.

This second webmail-themed phishing page will eventually redirect the victims to the real website of their email provider after the attackers have collected their user credentials.

Webmail provider selection menu
DocuSign branded landing page

“The actor engaging in this activity is not new to hosting on AWS, as we have observed it in similar low-volume campaigns throughout the year,” adds Proofpoint. “All non-AWS domains have utilized ‘Let’s Encrypt’ TLS certificates, and most appear to be registered with Russian domain registration services.”

Even though the threat actor behind this campaign used AWS to host the vast majority of their phishing kits, he has also used various other public storage services to host some parts of the landing pages.

“While Amazon itself appears to be responsive and especially vigilant in taking down abusive accounts hosting this type of material, defenders should be aware of potentially malicious content on webpages hosted on AWS S3 cloud storage,” concludes Proofpoint.

Cloud storage services commonly abused by phishers

The phishing campaign observed and analyzed by Proofpoint in their report follows a larger trend of threat actors taking advantage of cloud storage to host phishing kits.

For instance, during February, Edgewave researchers found that phishing campaigns abused Microsoft’s Azure Blob Storage to steal Microsoft and Outlook account credentials with the help of very convincing landing pages secured with the windows.net domain’s SSL certificates to appear legitimate.

Two months later, MinervaLabs’ researcher Omri Segev Moyal shared with BleepingComputer several custom Office 365 rules that can be successfully used to block phishing attacks that use Microsoft’s Azure Blob Storage for landing page hosting.

In April, phishing kits were also hosted by crooks on the web-based GitHub code hosting platform, abusing the service’s free repositories to deliver phishing landing pages to their targets via github.io domains.

But it’s not only Microsoft’s cloud services being misused by bad actors to make their phishing pages look legitimate. During early February, a campaign which attempted to steal Google and Facebook credentials utilizing Google Translate as camouflage was observed by Akamai’s Security Intelligence Response Team (SIRT).

Last but not least, Cloudflare’s IPFS gateway was also utilized by phishing actors to secure their scams using TLS certificates issued by Cloudflare as BleepingComputer found at the time.

Related Articles:

Clever Amazon Phishing Scam Creates Login Prompts in PDF Docs

Amazon Accounts Targeted by 16Shop Phishing Kit

Netflix, Ford, TD Bank Data Exposed by Open Amazon S3 Buckets

Microsoft Releases June 2019 Office Updates With Security Fixes

Get the Pay What You Want: The Complete Amazon Web Services eBook Bundle Deal

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51