One of Mitiga’s employees received an email phishing for credentials. Instead of just laughing it off, our team decided to use their lunch breaks to analyze it. What we found indicates a sophisticated phishing platform that uses AWS and Oracle infrastructure to phish Office 365 email accounts.

Summary of the Phishing Investigation

  • Mitiga’s research team discovered a widespread phishing campaign focused on stealing Office 365 credentials from SMBs, as well as large corporations.
  • The campaign has been active since at least April 2020, and is still ongoing.
  • The campaign imitates voice mail notifications sent to Office 365 users.
  • The phishing emails are sent from legitimate email accounts, compromised and controlled by an unknown threat actor.
  • The campaign’s infrastructure is hosted on AWS and Oracle resources, as well as on compromised websites, belonging to SMBs.

Modus Operandi of Attackers

This particular attack begins with the victim receiving a phishing email sent from a legitimate, but compromised, Office 365 email account. This email asks the targeted user to click a link for a voice mail message.

Once the link was clicked, the user is redirected through several proxies, including AWS load balancers, all the way to a compromised website belonging to a genuine organization. Our team identified over 40 websites belonging to SMBs that were compromised by the associated threat actors.

Ultimately, the victim ends-up on a fake and malicious Office 365 login page hosted on Oracle Cloud infrastructure. In some variations of these attacks, we also observed Office 365 login pages hosted on AWS S3 buckets.

Once the victim entered their credentials, they were exfiltrated to a compromised but legitimate website.

It should go without saying that these compromised Office 365 credentials may be used as entry vectors for deeper access into the victim organization’s network, or used to conduct a Business Email Compromise (BEC) attack.

Image for post

Image for post
Screenshot of phishing email. After clicking on “LISTEN TO VOICENOTE”, the user is redirected to an Office 365 login page

Image for post

It Gets Much More Interesting

Despite the campaign’s relatively trivial target (Office 365 credentials), it is actually quite sophisticated in several aspects:

First, the threat actors use a vast “network” of over 40 compromised websites as part of their infrastructure proxy chain.

Second, the threat actors use AWS load balancers as proxies, and Oracle Cloud resources for hosting the Office 365 login pages. In some cases we observed them hosted on AWS S3 buckets whose names imitate Zoom invitations. We believe the AWS and Oracle infrastructure is controlled and operated directly by the threat actors — who leveraged these freely available services for their malicious intentions.

Third, the threat actors sent the phishing emails from legitimate compromised email accounts.

Our team also found several interesting strings, comments, and function names that are possible clues hinting at the attacker’s origin. They were found while researching the HTML infrastructure deployed on the Office 365 login pages. We would like to stress that all of these may be false flags deployed by the threat actors to misguide security researchers. Nonetheless, we found:

  • References to various Asian cities/regions: Gagal (Iran), Kurang (India) and Kosong (North Korea).
  • References to Indonesian words:
  1. HTML pages had variables named “Tombol” (button) and “Tekan” (press).

2. Older HTML pages versions deployed as early as April 2020, had references to “Kolom” (Column), “Lagiya” (Again), “Kirim” (Send).

Evidence Points to a Turnkey Phishing ‘Solution’

There are several indications that lead us to believe that the threat actors received the phishing infrastructure from a 3rd party — as a Phishing-as-a-Platform solution, so-to-speak:

  • HTML pages contained comments like “// Set Link Here (3 LINK)”.
  • We observed several versions of the HTML pages with slight variations, for example, variables and function names, or compromised websites to which credentials are exfiltrated. The different versions were used in parallel, indicating the possibility that several sub-groups (‘customers’ if you will) use the same infrastructure, purchased/procured from the same source.

For the record, we found no evidence affiliating any of the findings above with a known cybercrime group.

Image for post

Image for post
Screenshots of HTML content of the compromised websites
Image for post
Screenshot of HTML content of the Office 365 login page with the indcative strings

Who Were the Targets?

During our investigation, we discovered several email addresses that received emails originating from the malicious infrastructure. These email addresses belong to small and medium sized businesses, as well as major financial institutions in the United States and Australia. The attackers targeted mostly C-level executives in these organizations.

We have no indication that the phishing attempts targeting these email addresses were indeed successful, and that their credentials were in fact stolen. However, at least some email addresses were indeed compromised by the threat actor — the ones that were used to send the malicious emails.

Due to the relatively sophisticated nature of this phishing campaign, we recommend checking whether any credentials were stolen.

Mitiga Recommendations

  1. Enforce Office 365 Multi-Factor Authentication.
  2. Enforce Office 365 password updates.
  3. Examine forwarding rules in your Email accounts.
  4. Search for hidden folders within Email inboxes, or check for emails in built-in folders were they should not be (e.g. RSS Feeds folder).
  5. Ensure changes to mailbox login & settings are logged and retained for 90 days.
  6. Enable alerts for suspicious activity, such as foreign logins, and analyze server logs for anomalous Email access.
  7. Consider simulating a similar attack scenario using a Red Team to test phishing awareness of the organization.
Learn how cloud incident response is different from traditional IR

LAST UPDATED:

May 4, 2024

Don't miss these stories:

Inside Mitiga’s Forensic Data Lake: Built for Real-World Cloud Investigations

Most security tools weren’t designed for the scale or complexity of cloud investigations. Mitiga’s Forensic Data Lake was.

Measurements That Matter: What 80% MITRE Cloud ATT&CK Coverage Looks Like

Security vendors often promote “100% MITRE ATT&CK coverage.” The reality is most of those claims reflect endpoint-centric testing, not the attack surfaces organizations rely on most today: Cloud, SaaS, AI, and Identity.

How Threat Actors Used Salesforce Data Loader for Covert API Exfiltration

In recent weeks, a sophisticated threat group has targeted companies using Salesforce’s SaaS platform with a campaign focused on abusing legitimate tools for illicit data theft. Mitiga’s Threat Hunting & Incident Response team, part of Mitiga Labs, investigated one such case and discovered that a compromised Salesforce account was used in conjunction with a “Salesforce Data Loader” application, a legitimate bulk data tool, to facilitate large-scale data exfiltration of sensitive customer data.

Why Visibility Drives Everything in Modern Cybersecurity with Sevco’s Greg Fitzgerald

In this episode of Mitiga Mic, Brian Contos sits down with Greg Fitzgerald, co-founder of Sevco Security, for a candid conversation on the real state of asset visibility, prioritization, and the evolving challenges facing security teams. With nearly three decades in the industry, Fitzgerald brings perspective on how cybersecurity has shifted from endpoint tools to orchestration-wide awareness. And why that shift is critical for cloud, SaaS, AI, and identity defense. Watch the episode or read the full transcript below.

God-Mode in the Shadows: When Security Tools and Excessive Permissions Become Cloud Security Risks

By the time the alarms go off, it’s often too late. A trusted third-party security tool, one that promised to protect your cloud and SaaS environments, has been operating with unchecked ‘god-mode’ privileges. These tools, usually classified as SaaS Security Posture Management (SSPM) or Data Security Posture Management (DSPM), have been granted near-unrestricted access to your data, configurations, and secrets.

How AI Is Transforming Cybersecurity: Detection, Response & Threat Evolution with Mitiga’s Ofer Maor

In this episode of Mitiga Mic, Brian Contos, Field CISO at Mitiga, sits down once again with Ofer Maor, CTO and Co-founder, to break down one of today’s most urgent cybersecurity challenges: the intersection of Artificial Intelligence (AI) and Detection & Response. From the Automated SOC to AI-powered attackers and cloud-based AI infrastructure threats, Ofer outlines the three pillars of AI-DR (AI Detection and Response) and what organizations need to know now and in the near future.