Η Microsoft παρακολουθεί μια τρέχουσα καμπάνια ηλεκτρονικού ψαρέματος στο Office 365 που χρησιμοποιεί διάφορες μεθόδους για να αποφύγει την αυτοματοποιημένη ανάλυση σε επιθέσεις εναντίον εταιρικών στόχων.
"The campaign uses enticing texts related to remote work, such as password updates, conference info, helpdesk tickets, etc."
Automatic redirection to valid domains
One of the evasion tactics used in this attack theftof credentials is the use of redirect URLs with the ability to trace incoming connections from sandbox environments commonly used by security researchers to gain more information about the attack.
Once such a link is detected, the attacker changes the sending of potential victims to a phishing destination page while redirecting any automated parsing attempts to legitimate sites.
This allows the "fishermen" to make sure that the phishing pages they have created will only be visited by real users, thus drastically reducing the chance of blocking their attacks and increasing the chances of having victims.
The phishing emails used in this campaign are also vague to ensure that security solutions will not be able to detect malicious emails and block them automatically before landing on target inbox.
This campaign also creates custom subdomains for each of the targets as a method to make the phishing URLs more credible in the eyes of the targets, thus increasing the success rate of the attacks.
These subdomains are created using various formats, but will almost always contain the name target user and their organization's domain name.
The display name patterns like “Update Password”, “Protect Reschanges”, “Helpdesk-#”, “SharePoint” and “Projects_communications” are also used to make the malicious website look real.