Page 108 - Cyber Defense eMagazine February 2024
P. 108

But this alarming rise is only half the problem – the approaches used to execute the attacks are growing
            wildly  complex,  incorporating  advanced  techniques  to  bypass  email  security  solutions  and  utilizing
            increasingly clever social engineering tactics to deceive unsuspecting victims.

            One  such  exploit  was  identified  by  Perception  Point's  team  of  analysts.  They uncovered  a  phishing
            campaign that took advantage of an open redirect vulnerability within one of Microsoft’s suite of services,
            potentially compromising client data.




            Point of Entry

            Open redirect vulnerabilities arise when a web application or server is configured in a way that allows
            attackers to redirect a user to an external, untrusted URL via a trusted domain.


            In the case of the team’s latest discovery, attackers exploited such vulnerabilities within Azure Functions
            – a Microsoft cloud computing platform for app developers – using parameters in URL queries that were
            either unvalidated or improperly sanitized. This oversight enabled malicious actors to craft URLs that
            appeared to belong to Microsoft but instead would redirect users to spoofed login sites via fraudulent QR
            codes.



            Attack Breakdown

            How did this attack work?

            It began with a user receiving an urgently worded email from what appeared to be Microsoft Support.
            Using a seemingly legitimate domain, the email easily passed the sender policy framework (SPF) checks
            – the email authentication standard domain owners use to verify email servers, which makes it hard for
            threat actors to push through fake sender information undetected.


            The email contained a PDF attachment with the subject line: “Please fix your credentials.” The PDF
            prompted users to update their account password and email credentials by clicking on the embedded
            link. This redirected users to a malicious QR code with Microsoft’s logo on it, which was hosted on a
            legitimate server on the popular image hosting site, Flickr.

            Reassured by the familiar logo, users were prompted to scan the code with their phone camera. Pairing
            familiar,  well-established  logos  with  malevolent  QR  codes  is  a  psychological  tactic  that  encourages
            people to use their less secure mobile devices, as opposed to more secure computers. In addition, when
            using  their  phones,  users  are  less  inclined  to  scrutinize  URLs  and  adhere  to  general  security
            recommendations.

            Scanning the QR code led to a series of URLs, exploiting an open redirection vulnerability in Azure
            Functions, creating a convincing chain of redirections that culminated in a spoofed Microsoft 365 login
            page.








            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          108
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   103   104   105   106   107   108   109   110   111   112   113