Experts Uncover Multi-Layer Redirect Strategy for Stealing Microsoft 365 Credentials

Published:

spot_img

Unmasking a New Phishing Campaign Utilizing Link Wrapping Techniques

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs link wrapping services from Proofpoint and Intermedia, creating new challenges for organizations trying to protect their digital assets. This technique uses legitimate services to obscure malicious content, allowing threat actors to bypass traditional security measures.

Link wrapping is a security measure designed to protect users by sending all clicked URLs through a scanning service. According to the Cloudflare Email Security team, this approach enables the detection and blocking of known malicious links at the moment a user clicks on them. However, this method is not infallible. If a wrapped link is not flagged by the scanner at click time, the attack can still succeed, leaving users vulnerable.

Recent Campaign Insights

In the past two months, researchers have observed a resurgence in this type of attack. Cybercriminals have managed to exploit the features of email services by maliciously redirecting unsuspecting victims to phishing pages that mimic Microsoft 365 login screens. The attackers gain unauthorized access to email accounts that utilize link wrapping features, leading to emails that automatically embed harmful URLs in a disguised format.

For instance, when an attacker compromises an email account, their malicious URL gets transformed into a wrapped link (e.g., urldefense.proofpoint[.]com/v2/url?u=). This enhances the chances of the link being trusted by the recipient, making it more likely that they will click it.

Multi-Tiered Redirect Abuse

Another troubling tactic noted by Cloudflare is known as "multi-tiered redirect abuse." In this scenario, cybercriminals first obfuscate their malicious links using URL shorteners like Bitly. When the shortened link is then sent from a Proofpoint-protected account, it undergoes a second layer of concealment. This creates a complex redirect chain that can easily slip through security filters, making it harder for recipients to recognize the danger.

Phishing Tactics in Action

The phishing emails often masquerade as legitimate notifications, such as voicemail alerts, urging the recipients to click on a link to listen to their messages. These links eventually lead to fraudulent pages designed to harvest sensitive credentials. Similarly, other variations of the phishing attempts involve emails claiming to notify users about documents shared in Microsoft Teams, cleverly tricking them into clicking harmful hyperlinks.

In yet another approach, attackers impersonate Teams notifications, stating that there are unread messages. The emails prompt users to click on a "Reply in Teams" button, which takes them straight to credential-harvesting sites.

The Rise of SVG-Based Phishing

In parallel with these link-wrapping abuses, there has been a noticeable increase in phishing campaigns leveraging Scalable Vector Graphics (SVG) files. Unlike traditional image formats like JPEG or PNG, SVG files are written in XML and can incorporate JavaScript and HTML code. This allows for the embedding of harmful scripts within seemingly harmless files, increasing the risk of multi-stage malware infections.

As highlighted by the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), SVGs can contain interactive elements and hyperlinks, which can be exploited to facilitate attacks that traditional anti-spam and anti-phishing protocols may miss.

Zoom Phishing Schemes

Moreover, phishing campaigns have also targeted Zoom users, embedding fake meeting links in emails. Upon clicking these links, victims often find themselves redirected in a chain of deceptive pages that ultimately end at a phishing site. After being presented with a "meeting connection timed out" message, unsuspecting users are directed to a page that requests their login credentials.

Crucially, the gathered information—including IP address, location, and other sensitive details—is subsequently exfiltrated via Telegram, famously known for its purported encryption and secure communication features.

Conclusion

As these methods become more advanced and prevalent, it is crucial for organizations and individuals alike to remain vigilant against such phishing attempts. Understanding the tactics exploited by cybercriminals aids in developing better defenses against these threats. While technology continuously evolves, so do the strategies employed by threat actors, making cybersecurity awareness more important than ever.

spot_img

Related articles

Recent articles

Tailored Tech Support Scams Launch Customized Havoc on Organizations

Growing Cyber Threats: Fake IT Support and the Havoc C2 Framework Emerging Threats in Cybersecurity Recent investigations by threat hunters have unveiled a concerning trend: cybercriminals...

ES-KO at 70: Celebrating Seven Decades of Excellence in Catering, Logistics, and Facility Management in Tough Environments

ES-KO: Celebrating 70 Years of Excellence in Catering and Facility Management ES-KO, a prominent player in the fields of catering, facility management, procurement, and...

Escalating Cyber Warfare: Iran, US, and Israel Clash on Military and Digital Battlegrounds

The Evolution of Warfare: Understanding the Hybrid Conflict in the Middle East Introduction to Hybrid Warfare In recent months, the Middle East has witnessed a significant...

70% of Online Fraud Linked to Fake Trading Apps; Maharashtra, UP, and Rajasthan Identify as Mule Account Hotspots

The Rise of Online Investment Scams in India A Shift in Cybercrime Tactics In recent times, the landscape of online fraud has dramatically changed, reflecting a...