research.checkpoint.com
Open in
urlscan Pro
141.193.213.21
Public Scan
URL:
https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/
Submission: On May 27 via api from US — Scanned from DE
Submission: On May 27 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* CheckPoint.com * * * * * * * Publications * Threat Research * CPRadio * Attack Reports * Tools * CPR Zero- Vulnerability Repository * Evasion techniques Encyclopedia * Anti-Debug Tricks * SandBlast File Analysis * How-To Guides * URL Categorization * Instant Security Assessment * Live Threat Map * About Us * Contact Us * Subscribe * MENU OFFICE 365 PHISHING CAMPAIGN EXPLOITS SAMSUNG, ADOBE AND OXFORD SERVERS June 18, 2020 INTRODUCTION Over the last few years, the adoption of Office 365 in the corporate sector has significantly increased. Its popularity has attracted the attention of cybercriminals who launch phishing campaigns specifically to attack the platform. As 90% of cyber-attacks start with a phishing campaign, Office 365 is an attractive target for threat actors who work to evade the continuously introduced security solutions. Recently, a seemingly unsophisticated Office 365 phishing campaign caught our attention. The attackers abused an Adobe Campaign redirection mechanism, using a Samsung domain to redirect victims to an O365 themed phishing website. The hackers took advantage of the fact that access to a reputable domain, such as Samsung’s, would not be blocked by security software. To expand their campaign, the attackers also compromised several websites to inject a script that imitates the same mechanism offered by the Adobe redirection service. Further investigation revealed that the actors behind the campaign implemented a few other interesting tricks to hide the phishing kit and avoid detection at each stage of the attack. This report will describe what we discovered about this Office 365 phishing campaign which used trusted services to allow a new attack. BEFORE WE START Neither Adobe nor Samsung were compromised in the sense of exploiting a vulnerability. Samsung’s Adobe Campaign server was left available for managing campaigns that were not necessarily part of the company’s marketing efforts. A redirection mechanism redirects users to a destination specified in the URL they just clicked. This allows campaign managers, for example, to gauge and monitor ongoing advertisement efforts by logging every successful visit before redirecting the user to an ad page. ATTACK FLOW In early April of 2020, we detected a phishing campaign that delivered “missed voice message” emails to its victims. Roughly 43% of these attacks targeted European companies while the rest were seen in Asia and the Middle East. The emails prompted users to click on a button that would allegedly take them to their Office 365 account. These emails use some very basic customization, such as a subject line with the target domain name and the username included in the body of the email. Despite the “Message from Trusted server” notification at the top, a vigilant user would have noticed some inaccuracies. Here is an example of one of the phishing emails: Office 365 Voice-Mail phishing email. After the victims clicked the button, they were redirected to a phishing page masquerading as the Office 365 login page. Behind the scenes, this redirection consists of two stages: the first stage abused an existing redirection scheme on the legitimate domain (e.g. samsung[.]ca), and the second stage redirected the user to a compromised WordPress site. Phishing attack scheme. Most of the emails came from multiple generated addresses belonging to legitimate subdomains from different departments in the University of Oxford (UK). xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk Example of an auto-generated email address used in this campaign. The email headers showed that the attackers found a way to abuse one of Oxford’s SMTP servers. The email originated from the NordVPN IP address 194.35.233.10 and then passed to the Oxford SMTP server and the Oxford Relay server as displayed below: Authentication-Results: spf=pass (sender IP is 129.67.1.166) smtp.mailfrom=paediatrics.ox.ac.uk; xxx; dkim=none (message not signed) header.d=none; xxx; dmarc=bestguesspass action=none header.from=paediatrics.ox.ac.uk;compauth=pass reason=109 Received-SPF: Pass (protection.outlook.com: domain of paediatrics.ox.ac.uk designates 129.67.1.166 as permitted sender) receiver=protection.outlook.com; client-ip=129.67.1.166; helo=relay13.mail.ox.ac.uk; Received: from relay13.mail.ox.ac.uk (129.67.1.166) by MR2FRA01FT016.mail.protection.outlook.com (10.152.50.130) Received: from smtp5.mail.ox.ac.uk ([163.1.2.207]) by relay13.mail.ox.ac.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk>) Received: from [194.35.233.10] (helo=[127.0.0.1]) by smtp5.mail.ox.ac.uk with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk>) From: "XXX VOIP" <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk> Authentication-Results: spf=pass (sender IP is 129.67.1.166) smtp.mailfrom=paediatrics.ox.ac.uk; xxx; dkim=none (message not signed) header.d=none; xxx; dmarc=bestguesspass action=none header.from=paediatrics.ox.ac.uk;compauth=pass reason=109 Received-SPF: Pass (protection.outlook.com: domain of paediatrics.ox.ac.uk designates 129.67.1.166 as permitted sender) receiver=protection.outlook.com; client-ip=129.67.1.166; helo=relay13.mail.ox.ac.uk; Received: from relay13.mail.ox.ac.uk (129.67.1.166) by MR2FRA01FT016.mail.protection.outlook.com (10.152.50.130) Received: from smtp5.mail.ox.ac.uk ([163.1.2.207]) by relay13.mail.ox.ac.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk>) Received: from [194.35.233.10] (helo=[127.0.0.1]) by smtp5.mail.ox.ac.uk with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk>) From: "XXX VOIP" <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk> Authentication-Results: spf=pass (sender IP is 129.67.1.166) smtp.mailfrom=paediatrics.ox.ac.uk; xxx; dkim=none (message not signed) header.d=none; xxx; dmarc=bestguesspass action=none header.from=paediatrics.ox.ac.uk;compauth=pass reason=109 Received-SPF: Pass (protection.outlook.com: domain of paediatrics.ox.ac.uk designates 129.67.1.166 as permitted sender) receiver=protection.outlook.com; client-ip=129.67.1.166; helo=relay13.mail.ox.ac.uk; Received: from relay13.mail.ox.ac.uk (129.67.1.166) by MR2FRA01FT016.mail.protection.outlook.com (10.152.50.130) Received: from smtp5.mail.ox.ac.uk ([163.1.2.207]) by relay13.mail.ox.ac.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk>) Received: from [194.35.233.10] (helo=[127.0.0.1]) by smtp5.mail.ox.ac.uk with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk>) From: "XXX VOIP" <xXbxiFzmbHpUBkFgaDKrcNFFwDwzmIDJEaHlPAEsgFqxaInjJX@paediatrics.ox.ac.uk> Using legitimate Oxford SMTP servers allowed the attackers to pass the reputation check for the sender domain. In addition, there was no need to compromise actual email accounts to send phishing emails because they could generate as many email addresses as they wanted. FIRST STAGE: ABUSING SAMSUNG’S EMAIL REDIRECT The technique of using Adobe Campaign open redirect was initially discovered in September 2019 on the domain belonging to Adobe itself. In the last few months, it’s been widely abused for phishing purposes. To evade detection, attackers abuse open and reputable Adobe Campaign servers to redirect potential victims to their own phishing websites. This means that the link embedded in the phishing email is part of a trusted domain – one that unknowingly redirects victims to the phishing website. In this case, the Adobe Campaign server belongs to Samsung Canada. https://t.email1.samsung[.]ca/r/?id=ff1b346f,303d531,303d53e&p1=8107023398&p2=8107023398&p3=DM15290&p4=https://compromised.site#user@company.com How does this work? t.email1.samsung[.]ca is a subdomain for Samsung-Canada email campaigns, which hosts an Adobe Campaign server. The specially crafted URL contains a parameter called p4 which provides the server with a different redirect destination for each victim. In our case, the attackers took the existing link from an old, but legitimate Samsung Cyber Monday themed email campaign dating back to 2018. By changing the p4 parameter, they repurposed it to redirect the victim to a domain they controlled instead of https://samsung.com/ca/: https://t.email1.samsung.ca/r/?id=hf1b346f,303d531,303d53e&p1=8107023398&p2=8107023398&p3=DM15290&p4=https://www.samsung.com/ca/?mkm_rid=8107023398&mkm_mid=DM15290&cid=ca_email_newsletter_holidaycybermonday_20181126_fr-x-x-viewproducts-x-x By using the specific Adobe Campaign link format and the legitimate domain, the attackers increased the chances for the email to bypass email security solutions based on reputation, blacklists and URL patterns. However, this is not the first time an Adobe Campaign on Samsung infrastructure was used as a relay for phishing. According to urlscan, the t.info.samsungusa[.]com domain has been used for phishing-related redirects since February 2020. SECOND STAGE: REDIRECT THE USER TO A COMPROMISED WORDPRESS SITE The second layer of redirection is used to distance the final phishing page from the original email. In this case, the attackers used several compromised WordPress sites which contain malicious redirect code. Introducing another redirection layer enables the attackers to circumvent security solutions that investigate the links within the email. Thus the URL within the email points to a WordPress site instead of a suspicious-looking phishing page. The redirect code, which is added to the compromised site’s homepage HTML code, also checks if the requested URL contains a # sign followed by an email address. If this condition is met, it redirects the victim to the final phishing kit. Redirection code on compromised WordPress sites. As a result, only users that have an email address in the link will be redirected, while users that enter the WordPress site directly do not notice any changes. This trick can prevent the site owners from detecting the abuse of their pages. MORE REDIRECTS A few days after the campaign launched, the attackers changed the URL inside the emails to the following one: https://t-email1.ottawashowers[.]ca/r/?id=ff1b346f,303d531,303d53e&p1=8107023398&p2=8107023398&p3=DM15290&p4=https://compromised.site&p5=user@company.com This time, the compromised WordPress site wasottawashowers[.]ca. The attacker set up the subdomain t-email1 and a redirection script in the /r/ folder to mimic Adobe Campaign URLs. The parameters from the original Samsung campaign were left unchanged. Indication that the domain t-email1.ottawashowers[.]ca was created for the purpose of the campaign. Phishing attack scheme with compromised WordPress site for first redirect. Later on in the campaign, the attackers changed the redirection method to be independent of a specific domain or Adobe Campaign server. They compromised and set up a similar redirect on multiple WordPress sites (to see the full list, go the IOCs section). Timeline of campaign with different redirect servers. In addition to changing the redirect domains, the threat actors started to change other (previously constant) parameters in the URL while preserving the basic Adobe URL structure. The parameters are used to check the integrity of the link, as well as to avoid detection by pattern-based engines (which will not automatically block all Adobe Campaign redirects). If a parameter is manually changed in this link, the server returns the message: AUTH FAILED. Opendir on one of compromised WordPress sites contains newly created redirect folder r/. PHISHING KIT The final phishing kit was located on compromised WordPress sites. In some cases, the phishing kit was located on sites designed to look like a Microsoft login page. A separate virtual directory is created for each victim, so the final URL is different for every victim, even on the same server. Microsoft phishing page. Most of the HTML code of the phishing pages is generated by JavaScript. The phishing page is divided into multiple sections, and each section is obfuscated with multi-byte XOR. For example, the <HEAD> section of the HTML page is a piece of JavaScript code containing 2 hex blobs that are unescaped and evaluated. Part of an obfuscated phishing page. Decoding the first eval() statement reveals the decoding function. First eval() statement after hex decoding. This decoding function extracts encoded data (stored in tmp[0]) and XOR key (stored in tmp[1]) from the argument and performs XOR between the data and the key (loop in the code above). The second eval() statement calls this decoding function and writes the final HTML to the page with document.write(): Second eval() statement after hex decoding Decoded <HEAD> section of HTML code Generated HTML code means that all the pages look the same, but they have completely different source codes. Together with obfuscation, this method helps hide the code and its malicious intents from security software. CONCLUSION In this campaign, the attackers used multiple mechanisms to bypass security solutions at each stage. * Utilizing an Oxford email server to send spam allows them to bypass the sender reputation filters and use generated email accounts instead of compromised actual accounts. * Links within the email point to a high reputation domain owned by Samsung. * A chain of redirects lead to a fully-obfuscated phishing page. During the short campaign period, the attackers continuously developed and improved the redirection method to be independent of a specific domain and the Adobe Campaign servers. Check Point recommends organizations to use cloud and mail security solutions. The fact these campaigns thrive proves native security solution are easy to bypass – such solutions are essential to remove threats getting into your email and protecting you cloud infrastructure. Adobe took the relevant actions to prevent this type of attack through its server across all customers. APPENDIX A: IOCS Redirect servers: t.email1.samsung[.]ca/r/ t-email1.ottawashowers[.]ca/r/ t-email1.instantytpresence[.]com/r/ flycloud.co[.]il/r/ cosmos.org[.]in/r/ iyak.org[.]tr/o/ ankit-gupta.co[.]in/r/ istern.co[.]il/r/ Compromised WP sites hosting Office 365 phishing kits or intermediate redirects: junestore[.]club popskill[.]net yourhindinews[.]com mrdigitalduniya[.]com vrpublicnews[.]com learndigitalseo[.]com ghassociates.co[.]in yournewstv[.]com codewithjustin[.]com pretrendy[.]com dalelaganj[.]com getfasternews[.]com bloggingthenews[.]com wpbasket.co[.]il acornmagic[.]club heaccountabilitycollective[.]com legaltax[.]in cbcvietnam[.]org zeriio[.]com ww.indoxxi[.]pl espinozaweb[.]net rumahcendekiaunj[.]com beatanyinvestment[.]club activedomain53[.]com absoluteaesthetics.co[.]uk tremplinedu[.]com iamkongu[.]com www.kwentongnoypi[.]com RELATED ARTICLES TWISTED PANDA: CHINESE APT ESPIONAGE OPERATION AGAINST RUSSIAN’S STATE-OWNED DEFENSE INSTITUTES NEW MALWARE CAPABLE OF CONTROLLING SOCIAL MEDIA ACCOUNTS INFECTS 5,000+ MACHINES AND IS ACTIVELY BEING DISTRIBUTED VIA GAMING APPLICATIONS ON MICROSOFT’S OFFICIAL STORE NEW WORMABLE ANDROID MALWARE SPREADS BY CREATING AUTO-REPLIES TO MESSAGES IN WHATSAPP VULNERABILITY IN GOOGLE PLAY CORE LIBRARY REMAINS UNPATCHED IN GOOGLE PLAY APPLICATIONS GRAPHOLOGY OF AN EXPLOIT – HUNTING FOR EXPLOITS BY LOOKING FOR THE AUTHOR’S FINGERPRINTS KEEPING THE GATE LOCKED ON YOUR IOT DEVICES: VULNERABILITIES FOUND ON AMAZON’S ALEXA NEW JOKER VARIANT HITS GOOGLE PLAY WITH AN OLD TRICK WOULD YOU LIKE SOME RCE WITH YOUR GUACAMOLE? “THE TURKISH RAT” EVOLVED ADWIND IN A MASSIVE ONGOING PHISHING CAMPAIGN REMOTE CLOUD EXECUTION – CRITICAL VULNERABILITIES IN AZURE CLOUD INFRASTRUCTURE (PART I) CANADIAN BANKS TARGETED IN A MASSIVE PHISHING CAMPAIGN 23RD MAY – THREAT INTELLIGENCE REPORT #ALHACK: ONE CODEC TO HACK THE WHOLE WORLD 16TH MAY – THREAT INTELLIGENCE REPORT RANSOMVERSARY : WANNACRY’S 5TH ANNIVERSARY SPECIAL AND THE EVOLUTION OF RANSOMWARE Publications * GLOBAL CYBER ATTACK REPORTS * RESEARCH PUBLICATIONS * IPS ADVISORIES * CHECK POINT BLOG * DEMOS Tools * SANDBLAST FILE ANALYSIS * URL CATEGORIZATION * INSTANT SECURITY ASSESSMENT * LIVE THREAT MAP About Us Contact Us Subscribe © 1994-2022 Check Point Software Technologies LTD. All rights reserved. Property of CheckPoint.com | Privacy Policy × Tweet Share Share Share Email Pin Share Share We'd like to show you notifications for the latest news and updates. AllowCancel