Phishing attacks / email scams are a tried-and-true method for retrieving data, but certain campaigns can be difficult to filter. Two campaigns that come to mind are Photo Copyright and SharePoint phishing campaigns. Not only do these campaigns wreak havoc on their victim’s devices and networks, but they are becoming exceptionally clever as time progresses. Let’s look at the similarities between Photo Copyright phishing campaigns and SharePoint phishing campaigns:
While phishing email attacks are common, the variations of these attacks are constantly evolving. One of the latest attacks involves a phishing email campaign that threatens to take legal action against you for using copyrighted images without consent. Attackers make these threats by sending a suspicious email to your email account, masquerading as a professional or licensed photographer with the “links” to the stolen images and a note to download a document with further proof that their images were stolen. It all seems quite convincing until you click on the link(s) and download a malicious JavaScript file.
What makes this scheme even more convincing is that the downloaded malicious files appear as if they’re hosted on Google Drive or Share Point. Once the files are downloaded, attackers can take control of your computer and hold it ransom, spy on your activity, and they could have access to important information security (bank accounts, email, contacts, etc.).
These photo copyright phishing emails tend to look extremely threatening and usually have awkward grammar. The attacker will even quote U.S Copyright statutes to make the letter sound more professional, like this letter that was posted on Sangfroidwebdesign.com.
Don’t be fooled by the convincing language. Clicking on any link in an email with these characteristics could lead to compromising important information stored on your computer.
Indicators of Compromise (IoC’s) for Photo Copyright Phishing:
In July 2021, another email phishing campaign was reported Microsoft. This campaign uses spoofed original sender email addresses and display sender addresses containing top-level domains to target organizations who use Office 365. The phishing attack also uses “Microsoft SharePoint” in spoofed display names to lure victims to click on “file share” requests titled “bonuses, price books, and staff reports – all valid requests, if they came from a legitimate source.
The goal is to get unsuspecting users of these platforms to click on phishing URLs that require them to sign-in to what they think is their file sharing platform, but it’s a phishing page with bogus Microsoft branding.
According to the Microsoft Security Intelligence team, the phishing emails contain two URLs with malformed HTTP headers, with the first one being a Google storage resource directing victims to an AppSpot domain. After requiring the user to sign-in, they are taken to another Google User Content domain with an Office 365 phishing page. The second URL is in the notification settings and links back to a compromised SharePoint.
Unfortunately, July 2021 was not the first time there was malicious activity concerning SharePoint. Avanan, a software company that catches advanced email attacks, detected a phishing email scam in August 2018. The email included an embedded link which led to a SharePoint file posing as an access request to a OneDrive file. After clicking on the link, victims were directed to a landing page designed to steal their Office 365 credentials. Over a year later, Naked Security, Cofense, and PhisLabs detected similar phishing email campaigns designed to steal Office 365 credentials.
The reason why the attackers can go undetected for so long and slip past endpoint security software, is because they change the encoding mechanisms using different methods for each segment, switching between plaintext HTML code, escaping, Base64, ASCII, chars, and yes, even Morse code. The phishing email campaign is also known to use Google and Digital Ocean to host their phishing pages.
Indicators of Compromise (IoC’s) for SharePoint Phishing:
[T1598.001] Spear phishing Service
[T1598.003] Spear phishing Link
[T1213.002] SharePoint
[T1212] Exploitation for Credential Access
https://twitter.com/MsftSecIntel/status/1421232634357714947
https://www.zdnet.com/article/microsoft-watch-out-for-this-sneakier-than-usual-phishing-attack/
https://securityintelligence.com/news/sharepoint-phishing-attacks/
https://www.avertium.com/flash-notice-avertium-detects-increase-in-stolen-images-phishing-campaign/
https://thehackernews.com/2021/08/hackers-spotted-using-morse-code-in.html
https://attack.mitre.org/techniques/T1598/003/
https://attack.mitre.org/techniques/T1598/001/
https://attack.mitre.org/techniques/T1213/002/
https://attack.mitre.org/techniques/T1212/
Note: The Avertium Threat Report analyzes one current threat that has been shared by threat intelligence networks across the globe. Used internally by the Avertium CyberOps Team, this report will outline a “top-of-mind” threat and how it ought to be addressed accordingly.
This informed analysis is based on the latest data available.