Multiple American firms’ Microsoft Office 365 and Outlook login credentials are the focus of a phishing effort. Attackers are utilising phoney voicemail notifications with HTML files in the continuing operation.
The Text Message Campaign
The campaign was detected by ZScaler researchers, who also revealed that it shares TTPs with another operation that will be studied in the middle of 2020.
In the present effort, the attackers send emails using Japanese email providers, spoofing the sender’s address to make it appear as though the emails are coming from the intended recipient’s company.
The email contains an HTML attachment that pretends to be a sound clip by employing a music note character. However, the victim is sent to a phishing website by the file’s obfuscated JavaScript code.
The firms being targeted are based in the United States and come from a variety of industries, such as industrial supply chains, security software, healthcare, pharmaceuticals, and the military.
Additional information
The phishing website’s URL structure utilises an assembly mechanism. In order to make the website appear to be a legitimate subdomain, it takes into account the target company’s domain.
To avoid detection by anti-phishing software, the redirection procedure initially directs the victim to a CAPTCHA check. This improves the likelihood that the process will appear legitimate to the victims.
After that, users are sent to a phishing page where their Office 365 accounts may be compromised.
Conclusion
Phishing that mimics voicemail is a successful method of collecting employee login information since it relies on the negligence of any one person throughout the network. While regular staff trainings might be beneficial, it is advised that users should double-check that they are on an official login page before entering or beginning to write a username and password.