04/29/2019

Microsoft Azure Customized Domain Name Phishing Attacks

by David Pickett


This article originally appeared on the AppRiver blog.


On Sept. 7, 2018, AppRiver detailed how malicious attackers abuse Microsoft Azure's Custom Domain Name registrations to host credential phishing sites.

This type of "living-off-the-land" attack utilizes phishing sites which reside on Microsoft's web servers. The phishing emails are also frequently sent from Microsoft's servers. Attackers are currently using: .web.core.windows.net, .blob.core.windows.net, and .azurewebsites.net for these customized Azure domain name attacks.

While researching the latest variants, we discovered some interesting finds that warrant an update to our previous threat alert. The first find was a successful attack where 284 different user credentials and geolocation information was exposed to the internet.

The second find was inevitable and anticipated - attackers began embedding these malicious links in attachments, which Zix and AppRiver's email security filters are capturing.

Compromised User Data Exposed

 

For this particular attack, the malicious actor registered office360outlooksupport as their Azure storage custom sub-domain to exploit unsuspecting users. Following the link to the phishing site yields the all-to-familiar clone of the Microsoft login portal. It automatically pre-fills the recipient's address by using the address inserted into the phishing email they received.

Viewing the source code of the phishing portal, we were able to see the attacker was posting the stolen data to an external compromised site. Ironically, the compromised site where the credentials were being sent was a website design company located in Kathmandu, Nepal, who had no idea this was occurring. Upon navigating to the site, we found the attacker had left an open directory. This allowed us to navigate thru the site structure and we noticed a file named, "emails_and_pass.txt."

Inside the emails_and_pass.txt file were 284 compromised users who had attempted to login to the phishing portal along with their geolocation data. While the attacker went thru the effort of crafting the phishing emails and site, they had left the stolen credentials open for anyone to see. Many of these users had attempted to login multiple times using different passwords. By doing this, attackers also have visibility into how these users have changed their passwords over time. This opens the possibility to additional password attacks directed toward those users.

Azure Customized Domain Phishing Links Now Inside Attachments

 

Since our previous threat alert, malicious actors also have begun to insert these Azure phishing links into Word and PDF attachments as well. This makes it simple for an attacker to create weaponized pdfs without having to purchase pdf creation software.

 
 

Zix & AppRiver Tips

 
Posted: 4/29/2019 4:46:09 PM by Mark Beebe | with 0 comments


Recent Posts

11/12/2019

How ZixArchive Makes Regulatory Compliance Accessible and Advantageous

by Dena Bauckman

View Blog Post

11/06/2019

11 Security Incidents that Illustrate the Digital Threats Facing Financial Firms

by David Bisson

View Blog Post

10/29/2019

U.S. Taxpayers Targeted by Phishing Emails Delivering the Amadey Botnet

by David Bisson

View Blog Post