This blog will take a look at targeted email scams, outline why they made their way into an inbox, and provide tips and recommendations to protect against such attacks. In this blog, we'll focus on two email attacks -one impersonating a FedEx online document share, and the other pretending to share shipping details from DHL Express. Both attacks aimed to extract victims' work email account credentials. Phishing pages were hosted on free services like Quip and Google Firebase to trick security technologies and users into thinking the links were legitimate.
Org mailboxes: ~10,000
Email security bypassed: Exchange Online Protection (EOP), Microsoft Defender for Office 365
Techniques used: Social engineering, link redirects, hosting phishing pages on Quip and Google Firebase, brand impersonation
This email attack bypassed native Microsoft email security controls. Microsoft assigned a Spam Confidence Level (SCL) of '1' to the FedEx email and '-1' to the DHL email, which meant that Microsoft did not determine these emails as suspicious and delivered them to end user mailboxes.
Let's go through both attacks in greater detail:
A summary of the attack is presented below:
Fig 1: Summary of the FedEx phishing scam showing the attack flowA few days ago, the Armorblox threat research team observed an email impersonating FedEx attempt to hit one of our customer environments. The email was titled 'You have a new FedEx sent to you' followed by the date the email was sent. The email contained some information about the document to make it seem legitimate, along with links to view the supposed document.
A snapshot of the email is given below:
Fig 2: Email impersonating FedEx and claiming to contain a scanned document for reviewClicking the email link takes victims to a file hosted on Quip, which is an additive tool for Salesforce that offers documents, spreadsheets, slides, and chat services. Quip has a free version, which is likely what the attackers used to host this page.
The page is titled 'You have received some incoming FedEx files', is emblazoned with a huge FedEx logo, and includes a link for victims to review the document.
Fig 3: Landing page hosted on Quip with a link to review the documentWe have observed a continuing trend of malicious actors hosting phishing pages on legitimate services like Google Sites, Box, and Quip (in this case). Most of these services have free versions and are easy to use, which make them beneficial for millions of people around the world, but unfortunately also lower the bar for cybercriminals to launch successful phishing attacks.
Clicking the link on this page takes victims to the final phishing page resembling the Microsoft login portal. The parent domain shows that the link is hosted on Google Firebase. Reputed URLs like that of Firebase will fool people (and email security technologies) into thinking that the link is legitimate.
Fig 4: Final phishing page spoofing the Microsoft login portal that's hosted on Google FirebaseEntering fake details on this page reloads the login portal with an error message asking the victim to enter correct details. This might point to some backend validation mechanism in place that checks the veracity of entered details. Alternately, attackers might be looking to harvest as many email addresses and passwords as possible and the error message will keep appearing regardless of the details entered.
Fig 5: Entering fake details shows an error message asking users to enter correct detailsA summary of the attack is presented below:
Fig 6: Summary of the DHL Express phishing scam showing the attack flowA few days ago, the Armorblox threat research team observed an email impersonating DHL Express attempt to hit one of our customer environments. The email sender name was 'Dhl Express' and title was 'Your parcel has arrived', including the victim's email address at the end of the title. The email informed victims that a parcel arrived for them at the post office, and that the parcel couldn't be delivered due to incorrect delivery details. The email includes attached shipping documents that victims are guided to check if they want to receive their delivery.
A snapshot of the email is given below:
Fig 7: Email impersonating DHL Express and claiming to contain attached shipping documentsThe email attachment is an HTML file titled 'SHIPPING DOC'. Downloading and opening the HTML previews a spreadsheet that looks like shipping documents. The preview is layered over with a login request box impersonating the Adobe brand.
Fig 8: HTML attachment opens a phishing page with a spreadsheet previewIt's possible that attackers were trying to phish for Adobe credentials, but it's more likely that they were trying to get victims' work email credentials. The email field in the login box was pre-filled with the victim's work email.
Attackers are banking on victims to act before they think and enter their work email password into this box without paying too much attention to the Adobe branding.
Just like with the FedEx phishing attack, entering fake details on this page returns an error message asking the victim to enter correct details.
Fig 9: Phishing page returns an error message upon entering fake detailsThese email attacks employed a gamut of techniques to get past traditional email security filters and pass the eye tests of unsuspecting end users.
Here are some points of guidance for individuals or organizations looking to protect themselves against targeted email attacks:
Both emails highlighted in this blog got past Microsoft's Exchange Online Protection (EOP), with an assigned Spam Confidence Level (SCL) of 1 or -1, which means either the emails skipped past spam filters or EOP determined that they weren't spam. For better protection coverage against email attacks (whether they're phishing, business email compromise, or 0-day credential phishing attacks like this one), organizations should invest in technologies that take a materially different approach to threat detection.
Since we get so many emails from service providers, our brains have been trained to quickly execute on their requested actions. It's much easier said than done, but engage with these emails in a rational and methodical manner whenever possible. Subject the email to an eye test that includes inspecting the sender name, sender email address, language within the email, and any logical inconsistencies within the email (e.g. Why is the email sender name 'Dhl Express' instead of 'DHL Express', Why does this shipping details document have an HTML extension? etc.).
Consider deploying a security awareness training product to provide your employees with the education that helps them work smarter and more safely.
Since all workplace accounts are so closely interlinked, sharing credentials to one of your accounts can prove to be very dangerous as cybercriminals send emails in your name to trick your customers, partners, acquaintances, and family members.
If you haven't already, implement these hygiene best practices:
We'd love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!
Cisco Security Social Channels
Instagram
Facebook
Twitter
LinkedIn