New EvilProxy Phishing Attack Uses Indeed.com Redirector to Target US Executives

0
682
New EvilProxy Phishing Attack Uses Indeed.com Redirector to Target US Executives


Microsoft, the Dark Web and the title John Malkovich all issue into this EvilProxy phishing assault. The excellent news is there are steps IT can take to mitigate this safety menace.

A brand new EvilProxy phishing assault is leveraging an open redirection flaw from the professional Indeed.com job search web site, in response to a report from Menlo Security, a cloud-based safety firm. Menlo Security notes this phishing assault marketing campaign targets C-suite workers and different key executives at U.S.-based organizations primarily in manufacturing, insurance coverage, banking and monetary providers, property administration and actual property.

Jump to:

What is EvilProxy?

EvilProxy is a phishing-as-a-service equipment that has been round since no less than September 2022. This equipment permits an attacker to efficiently bypass two-factor authentication through the use of a reverse proxy performance. To obtain that operation, the EvilProxy service units up a phishing web site in response to chosen choices earlier than the equipment is deployed on the web. Once a person accesses the phishing web page, they’re requested to offer their credentials and 2FA code. This data is utilized in actual time by the equipment to open a hijacked session on the professional service the attacker targets.

EvilProxy is being offered on the Dark Web as a subscription-based service with plans starting from 10 to 31 days. Someone utilizing the nickname John_Malkovich performs the function of administrator and middleman aiding clients who’ve bought the service, in response to Menlo Security.

How this new phishing marketing campaign abuses Indeed.com redirector

This new EvilProxy assault begins with a phishing electronic mail despatched to targets. The electronic mail incorporates a hyperlink that abuses an open redirector from Indeed (Figure A).

Figure A

Phishing email sample that contains a redirection from the Indeed.com domain.
Phishing electronic mail pattern that incorporates a redirection from the Indeed.com area. Image: Menlo Security

Redirectors are internet hyperlinks that may be used on professional web sites for various causes; nonetheless, redirectors have to be nicely carried out in order that they’re not abused. An open redirection is a redirection that may reroute the browser to any exterior area.

In this assault, the menace actor takes benefit of a t.certainly.com subdomain, which is an open redirector when being supplied with right parameters:

https://t.indeed.com/r?parenttk=1ddp6896a2tsm800&target=https://youtube.com

Once the goal clicks the hyperlink, they’re redirected to a faux Microsoft login web page, which is supplied by the EvilProxy equipment. The unsuspecting goal offers their credentials and 2FA code to the phishing web page. On the server facet, the equipment makes use of these credentials and 2FA in actual time to offer the attacker with a sound session cookie, which can be utilized to entry the sufferer’s assets on the Microsoft web site (Figure B).

Figure B

New EvilProxy Phishing Attack Uses Indeed.com Redirector to Target US Executives
Attack chain illustration with EvilProxy getting used as a reverse proxy. Image: Menlo Security

In addition to the redirection from Indeed.com, two different redirections observe, managed by the attackers (Figure C).

Figure C

Phishing redirection flow.
Phishing redirection movement. Image: Menlo Security

Technical proof of EvilProxy utilization

According to the researchers, the phishing pages are hosted on widespread URI paths which might be usually utilized by EvilProxy:

  • /ests/2.1/content material/
  • /shared/1.0/content material/
  • /officehub/bundles/

The phishing equipment additionally makes use of Microsoft’s Ajax Content Delivery Network to assist with dynamic fetching and rendering of JavaScript content material.

An HTTP POST request incorporates the sufferer’s base64-encoded electronic mail handle and a session identifier, which can also be typical of the EvilProxy phishing equipment. The FingerprintJS library can also be used for browser fingerprinting.

Researcher Ravisankar Ramprasad explains that IP addresses working on NGINX servers replying with a “407 Proxy Authentication Required” are additionally indications of EvilProxy, in addition to websites with 444 standing code with subdomains corresponding to lmo., auth., dwell., login-live. and mso.

Which industries are targets of this phishing marketing campaign?

In addition to manufacturing, insurance coverage suppliers, banking and monetary providers, property administration and actual property, different impacted sectors in lowering order are digital parts manufacturing, prescribed drugs, healthcare and development. Approximately 3% of the targets are in different sectors that embody software program, enterprise consulting, accounting, provide chain administration and logistics (Figure D).

Figure D

Distribution of verticals targeted in this phishing campaign.
Distribution of verticals focused on this phishing marketing campaign. Image: Menlo Security

How to mitigate this EvilProxy phishing menace

Service suppliers and web sites shouldn’t enable redirections with out correct management and sanitizing of the parameters supplied to the redirector. Most redirectors must be configured to solely enable inner hyperlinks. If a web site does want a redirection to an exterior hyperlink, further safety measures, corresponding to utilizing whitelists of exterior domains, should be deployed.

Employees must be educated to detect phishing electronic mail and malicious hyperlinks that may be contained in them. In case of doubt, workers will need to have a simple method, presumably by way of a clickable button of their electronic mail shopper, to report a suspicious electronic mail to the IT safety employees for additional evaluation. In addition, electronic mail safety options should be deployed to detect phishing or malware an infection makes an attempt.

All working techniques and software program ought to all the time be updated and patched to keep away from being compromised by a standard vulnerability.

Disclosure: I work for Trend Micro, however the views expressed on this article are mine.

LEAVE A REPLY

Please enter your comment!
Please enter your name here