www.armorblox.com
Open in
urlscan Pro
2a05:d014:275:cb01:8909:43f0:2069:7b77
Public Scan
Submitted URL: https://www.armorblox.com/blog/ups-credential-phishing-attack?utm_medium=newsletter&utm_source=email&utm_campaign=en+20220...
Effective URL: https://www.armorblox.com/blog/ups-credential-phishing-attack/?utm_medium=newsletter&utm_source=email&utm_campaign=en+2022...
Submission: On July 29 via api from US — Scanned from DE
Effective URL: https://www.armorblox.com/blog/ups-credential-phishing-attack/?utm_medium=newsletter&utm_source=email&utm_campaign=en+2022...
Submission: On July 29 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form id="mktoForm_1082" __bizdiag="196351835" __biza="W___" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" data-styles-ready="true">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol">
<div class="mktoOffset"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth">
<div class="mktoAsterix">*</div>Email:
</label>
<div class="mktoGutter mktoHasWidth"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true"
data-personalize-email="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple"><button type="submit" class="mktoButton" data-personalize-button="true">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1082"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="176-XMJ-030">
</form>
<form __bizdiag="-2059433751" __biza="W___" novalidate="novalidate" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"
class="mktoForm mktoHasWidth mktoLayoutLeft"></form>
Text Content
Free risk assessment * Product * Overview * Integrations * Solutions By Use Case * Business Email Compromise * Email Account Compromise * Executive Phishing * Data Loss Prevention * Abuse Mailbox Remediation By Platform * Microsoft Office 365 * Google Workspace * Secure Email Gateway Augmentation By Industry * Financial Services * Education * Healthcare * Customers * Learn * Analyst Validation * Learning Center * Resources * Blog * Company * About Us * News Free risk assessment Back ACTION REQUIRED, PROVIDE YOUR SENSITIVE INFORMATION BEFORE DELIVERY: UPS CREDENTIAL PHISHING ATTACK Written by Lauryn Cash Threat Research / 7.11.22 In today’s Blox Tale, we will take a deeper look into a credential phishing attack that used a gamut of different techniques in an attempt to steal confidential data. We will see how attackers take advantage of a legitimate company’s brand name and recognition to instill trust in unsuspecting victims. The attack in the spotlight is a malicious email, spoofing United Parcel Service (UPS), a prominently known multinational shipping & receiving and supply chain management company. The email attack looked like a legitimate UPS Express email, simply reaching out to the customer about a pending parcel delivery. Exploiting our curiosity bias, this email attack attempts to navigate victims to a fake UPS confirmation page where victims are prompted to enter a multitude of sensitive, personal identifiable information. -------------------------------------------------------------------------------- SUMMARY Mailboxes: More than 5,000 Target: This attack targeted a major software company for IT solution providers. Email security bypassed: Microsoft Office 365 Techniques used: Social engineering, brand impersonation, spoofed landing page -------------------------------------------------------------------------------- THE EMAIL The subject of this socially engineered email attack read, “Your package UPS is Pending !” and looked to be sent from UPS. We see the name of the sender has been manipulated in order to pass the eye test of unsuspecting victims. At first glance, this sender name, uspostalservice@usp.com, can trick victims, especially with the USP being so close to UPS; however, it is the sender name that is the true giveaway here – showing association with US Postal Service (USPS), not to be confused with United Parcel Service (UPS). Additionally, the email domain of the sender ensint.com is not associated with UPS. The email body spoofed a notification sent from UPS about an upcoming parcel delivery status of pending due to incomplete delivery address. The victim is instructed to reschedule the delivery of the parcel by updating his or her delivery address. Additionally, the attacker instills a sense of urgency by stating the victim has three days to complete this request and collect the package, otherwise additional steps and information will need to be collected. Fig 1: Fake email spoofing UPS notification In this email attack, the attacker played on and took advantage of the victim’s fear of accepting this parcel becoming a hassle. We have all had parcels delivered to us that either needed a signature or proof of identification in order to be collected. If you miss the delivery window or do not have the correct information, then the parcel delivery needs to be rescheduled - and if urgent, can prohibit important goods from being delivered in a timely manner. Attackers know this, and took advantage of the victim(s) of this email attack by stating that increased measures would need to be taken if the recipient’s address information was not updated. Naturally, we as humans want to eliminate stress in our very busy lives; therefore, are more likely to fall victim to this attack - which was exactly the attacker’s goal and motive. THE PHISHING PAGE Upon clicking the ‘Update my delivery address settings’ link within the body of the email, victims are navigated to a fake landing page. This landing page was purposefully crafted to mimic a legitimate UPS webpage. Attackers showcased the UPS logo prominently and even crafted a fake tagline for the company: “Delivery all over The World”. UPS did retire their well-known slogan, “What can brown do for you”, as the company took a new approach of, “We (heart) logistics”. Attackers chose to take advantage of this, as this crafted fake tagline is relevant to the UPS brand, tricking victims into believing this is the new slogan - making this fake landing page more believable. Fig 2: Link in email leads to fake UPS confirmation page The fake landing page also showcased an image of a parcel, bringing to life the idea of a parcel pending delivery. On this page, victims are prompted to enter the parcel number (seen as N° on page) found within the email received, and to click continue. Fig 3: Fake UPS confirmation page exfiltrates PII & PCI data Upon clicking ‘continue’, victims are taken to a second screen that asks for sensitive PII information: address, email, phone number, date of birth, as well as sensitive PCI (payment card information). Victims who completed this step in the attack flow would have voluntarily given attackers their most sensitive information and put themselves at risk. ATTACK FLOW Attackers used a valid domain to send this malicious email that contained a link to a fake landing page, with the goal to exfiltrate sensitive PII and PCI data. This email attack passed both SPF and SPF Alignment authentication checks. Looking at the Whols information for the URL within the email attack body, the reputation score is ‘trustworthy’, receiving a 92 out of 100 score. This email attack would have bypassed email security solutions that only look at these checks; however, Armorblox accurately detected this bad url within the email attack body through NLU - providing better protection to end users from these types of targeted, malicious attacks. This email attack impersonated a well-known brand, with the intention to create a sense of trust in the victim. Attackers included legitimate logos and company branding across the email and landing pages, in order to exfiltrate the victim’s sensitive PII and PCI data. Once the attacker succeeded in getting the victim outside of the email, each subsequent action was designed to take further advantage of the victim’s curiosity and trust, as well as the willingness to comply to reduce unnecessary stress or complexity. -------------------------------------------------------------------------------- RECAP OF TECHNIQUES USED This email attack employed a gamut of techniques to get past traditional email security filters and pass the eye tests of unsuspecting victims. Social engineering: The email title, design, and content aimed to induce a sense of trust and urgency in the victims. Trust was induced by impersonating a well-known brand (UPS) and a sense of urgency through the language used within both the email and the fake landing pages. The context of this attack also leverages the curiosity effect, which is a cognitive bias that refers to our innate desire to resolve uncertainty and know more about something. Brand impersonation: The email has HTML styling and disclaimers similar to UPS branding. The information included within the body of the email attack is similar to legitimate UPS communications, plus the logos used within both the email and landing pages are the same in order to try and trick the victim and instill trust. GUIDANCE AND RECOMMENDATIONS 1. Augment native email security with additional controls The email highlighted in this blog got past native email security. For better protection and coverage against email attacks (whether they’re spear phishing, business email compromise, or credential phishing attacks like this one), organizations should augment built-in email security with layers that take a materially different approach to threat detection. Gartner’s Market Guide for Email Security covers new approaches that vendors brought to market in 2021 as well as Armorblox highlights this in the 2022 Email Security Threat Report, and should be a good starting point for your evaluation. 2. Watch out for social engineering cues Since we get so many emails from service providers, our brains have been trained to quickly execute their requested actions. It’s much easier said than done but engage with these emails in a rational and methodical manner whenever possible. Subject the email to an eye test that includes inspecting the sender name, sender email address, the language within the email, and any logical inconsistencies within the email. 3. Follow multi-factor authentication and password management best practices If you haven’t already, implement these hygiene best practices to minimize the impact of credentials being exfiltrated: * Deploy multi-factor authentication (MFA) on all possible business and personal accounts. * Don’t use the same password on multiple sites/accounts. * Use password management software like LastPass or 1password to store your account passwords. -------------------------------------------------------------------------------- For more email security threat research, news, and industry guidance, sign up for email updates from Armorblox below. Join the Bloxlist ARMORBLOGS Blogs from Armorblox. We couldn't resist the portmanteau. * Email: Subscribe Follow Us -------------------------------------------------------------------------------- READ THIS NEXT A POINTED SPOOF: PROOFPOINT CREDENTIAL PHISHING Threat Research / 11.4.21 LEAVE YOUR MESSAGE AFTER THE BEEP: WHATSAPP VOICEMAIL PHISHING ATTACK FROM RUSSIA Threat Research / 4.4.22 THE EMAIL BAIT … AND PHISH: META INSTAGRAM PHISHING ATTACK Threat Research / 3.16.22 BLOX TALES: MICROSOFT DEFENDER VISHING USING ANYDESK Threat Research / 10.14.21 FBI 2020 IC3 REPORT FINDINGS: BEC AND EAC LOSSES CONTINUE TO RISE News and Commentary / 3.19.21 HELLO, IS IT ME YOU'RE PHISHING FOR: AMAZON VISHING ATTACKS Threat Research / 5.20.21 Armorblox secures enterprise communications over email and other cloud office applications with the power of Natural Language Understanding. The Armorblox platform connects over APIs and analyzes thousands of signals to understand the context of communications and protect people and data from compromise. Over 58,000 organizations use Armorblox to stop BEC and targeted phishing attacks, protect sensitive PII and PCI, and automate remediation of user-reported email threats. Armorblox was featured in the 2019 Forbes AI 50 list and was named a 2020 Gartner Cool Vendor in Cloud Office Security. Founded in 2017, Armorblox is headquartered in Sunnyvale, CA and backed by General Catalyst and Next47. * Product * Overview * Integrations * Solutions * Business Email Compromise * Email Account Compromise * Executive Phishing * Email Data Loss Prevention * Abuse Mailbox Remediation * Armorblox * Customers * Resources * Blog * Company * About Us * News * Careers -------------------------------------------------------------------------------- © 2022 Armorblox. All Rights Reserved. Privacy Policy. --------------------------------------------------------------------------------