{"id":90286,"date":"2019-12-11T09:00:56","date_gmt":"2019-12-11T17:00:56","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90286"},"modified":"2023-05-26T14:47:52","modified_gmt":"2023-05-26T21:47:52","slug":"the-quiet-evolution-of-phishing","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/12\/11\/the-quiet-evolution-of-phishing\/","title":{"rendered":"The quiet evolution of phishing"},"content":{"rendered":"
The battle against phishing is a silent one: every day, Office 365 Advanced Threat Protection<\/a> detects millions of distinct malicious URLs and email attachments. Every year, billions of phishing emails<\/a> don\u2019t ever reach mailboxes\u2014real-world attacks foiled in real-time. Heuristics, detonation, and machine learning, enriched by signals from Microsoft Threat Protection services, provide dynamic, robust protection against email threats.<\/p>\n Phishers have been quietly retaliating, evolving their techniques to try and evade these protections. In 2019, we saw phishing attacks reach new levels of creativity and sophistication. Notably, these techniques involve the abuse of legitimate cloud services like those offered by Microsoft, Google, Amazon, and others. At Microsoft, we have aggressive processes to identify and take down nefarious uses of our services without affecting legitimate applications.<\/p>\n In this blog we\u2019ll share three of the most notable attack techniques we spotted this year. We uncovered these attacks while studying Office 365 ATP signals, which we use to track and deeply understand attacker activity and build durable defenses against evolving and increasingly sophisticated email threats.<\/p>\n Over the years, phishers have become better at evading detection by hiding malicious artifacts behind benign ones. This tactic manifests in, among many others, the use of URLs that point to legitimate but compromised websites or multiple harmless-looking redirectors that eventually lead to phishing.<\/p>\n One clever phishing campaign we saw in 2019 used links to Google search results that were poisoned so that they pointed to an attacker-controlled page, which eventually redirected to a phishing page. A traffic generator ensured that the redirector page was the top result for certain keywords.<\/p>\n <\/p>\n Figure 1. Phishing attack that used poisoned search results<\/em><\/p>\n Using this technique, phishers were able to send phishing emails that contained only legitimate URLs (i.e., link to search results), and a trusted domain at that, for example:<\/p>\n The campaign was made even stealthier by its use of location-specific search results. When accessed by users in Europe, the phishing URL led to the redirector website c77684gq[.]beget[.]tech<\/em>, and eventually to the phishing page. Outside Europe, the same URL returned no search results.<\/p>\n For this to work, attackers had to make sure that their website, c77684gq[.]beget[.]tech<\/em>, was the top search result for the keyword “hOJoXatrCPy<\/em>” when queried from certain regions. The website\u2019s HTML code is composed of a redirector script and a series of anchor elements:<\/p>\n <\/p>\n Figure 2. Redirector code<\/em><\/p>\n These anchor elements were designed to be crawled by search engines so that the page is indexed and returned as result for the search keywords that attackers wanted to use for their campaign.<\/p>\n <\/p>\n Figure 3. Anchor tags containing search keywords<\/em><\/p>\n The attackers then set up a traffic generator to poison search results. Because the phishing URL used the open redirector functionality, it redirected to the top search result, hence the redirector page.<\/p>\n The other way that phishers evade detection is to use multiple URLs and sometimes even multiple domains for their campaigns. They use techniques like subdomain generation algorithms to try and always get ahead of solutions, which, without the right dynamic technologies, will be forced continually catch up as phishers generate more and more domains and URLs.<\/p>\n This year, attackers have found another shrewd way to serve phishing: custom 404 pages. We uncovered a phishing campaign targeting Microsoft that used 404 pages crafted as phishing pages, which gave phishers virtually unlimited phishing URLs.<\/p>\n <\/p>\n Figure 4. Phishing attack that uses specially crafted 404 Not Found error page<\/em><\/p>\n The custom 404 page was designed to look like the legitimate Microsoft account sign-in page.<\/p>\n <\/p>\n Figure 5. 404 page designed as phishing page<\/em><\/p>\n Because the malformed 404 page is served to any non-existent URL in an attacker-controlled domain, the phishers could use random URLs for their campaigns. For example, we saw these two URLs used in phishing campaigns; the attackers added a single character to the second one to generate a new URL but serve the same phishing page:<\/p>\n We also found that the attackers randomized domains, exponentially increasing the number of phishing URLs:<\/p>\n All of these non-existent URLs returned the 404 error page, i.e., the phishing page:<\/p>\n <\/p>\n Figure 6. When phishing URL is accessed, server responds with HTTP 404 error message, which is a phishing page<\/em><\/p>\n Phishers have also been getting better at impersonation: the more legitimate the phishing emails looked, the better their chances at tricking recipients. Countless brands both big and small have been targets of spoofing by phishers.<\/p>\n One particular phishing campaign in 2019 took impersonation to the next level. Instead of attackers copying elements from the spoofed legitimate website, a man-in-the-middle component captured company-specific information like logos, banners, text, and background images from Microsoft\u2019s rendering site.<\/p>\n Phishers sent out emails with URLs pointing to an attacker-controlled server, which served as the man-in-the-middle component and simulated Microsoft sign-in pages. The server identified certain specific information based on the recipient\u2019s email address, including the target company, and then gathered the information specific to that company. The result was the exact same experience as the legitimate sign-page, which could significantly reduce suspicion.<\/p>\n <\/p>\n Figure 7. Phishing attack that abuses Microsoft\u2019s rendering site<\/em><\/p>\n Using the same URL, the phishing site was rendered differently for different targeted users. To generate legitimate-looking phishing sites, the server used the following code to retrieve the banner used by the target\u2019s victim company as identified by the domain information in the email address; the response is the URL for the company banner:<\/p>\n <\/p>\n Figure 8. Code snippet for requesting the banner<\/em><\/p>\n The server also retrieved the text used in the company\u2019s sign-in page; the response is the actual text specific to the target victim\u2019s company:<\/p>\n <\/p>\n Figure 9. Code snippet for requesting the company-specific text<\/em><\/p>\n To complete the legitimate-looking phishing page, the server requested the background image using the code below; the response is the URL to the image:<\/p>\n <\/p>\n Figure 10. Codes snippets for requesting background image<\/em><\/p>\n The phishing techniques that we discussed in this blog are vastly different from each, but they are all clever attempts to achieve something that\u2019s very important for phishers and other cybercrooks: stealth. The longer phishers can quietly hide from security solutions, the more chances they have to invade inboxes and trick people into divulging sensitive information.<\/p>\n To hunt down phishing and other threats that don\u2019t want to be found, Office 365 ATP<\/a> uses advanced security technologies that expose sophisticated techniques. Our URL detonation technology can follow the attack chain so it can detect threats even if they hide behind legitimate services and multiple layers of redirectors.<\/p>\n This rich visibility into email threats allows Office 365 ATP to continuously inform and improve its heuristic and machine learning protections so that new and emerging campaigns are blocked in real-time\u2014silently protecting customers from attacks even when they don\u2019t know it. The insights from Office 365 ATP also allow our security experts to track emerging techniques and other attacker activities like the ones we discussed in this blog, allowing us to ensure that our protections are effective not just for the campaigns that we see today but those that might emerge in the future.<\/p>\n In addition, with the new campaign views in Office 365 ATP<\/a> currently in preview, enterprises can get a broad picture of email campaigns observed in their network, with details like when the campaign started, the sending pattern and timeline, the list of IP addresses and senders used in the attack, which messages were blocked or otherwise, and other important information.<\/p>\n As an important component of Microsoft Threat Protection<\/a>, Office 365 ATP provides critical security signals about threats that arrive via email\u2014a common entry point for cyberattacks\u2014to the rest of Microsoft\u2019s security technologies, helping provide crucial protection at the early stages of attacks. Through signal-sharing and remediation orchestration across security solutions, Microsoft Threat Protection provides comprehensive and integrated protection for identities, endpoints, user data, apps, and infrastructure.<\/p>\n <\/p>\n Patrick Estavillo<\/em><\/strong> <\/p>\n <\/p>\n <\/p>\n Read all Microsoft security intelligence blog posts<\/a>.<\/p>\nHijacked search results lead to phishing<\/h2>\n
\n
404 Not Found pages customized to be phishing sites<\/h2>\n
\n
\n
Man-in-the-middle component for dynamic phishing attack<\/h2>\n
Office 365 ATP: Durable and dynamic defense for evolving email threats<\/h2>\n
\nOffice 365 ATP Research Team<\/em><\/p>\n
\n