unit42.paloaltonetworks.com Open in urlscan Pro
23.56.206.30  Public Scan

URL: https://unit42.paloaltonetworks.com/european-phishing-campaign/
Submission: On December 18 via api from TR — Scanned from FR

Form analysis 1 forms found in the DOM

Name: Unit42_SubscribePOST https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json

<form action="https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json" method="post" novalidate="" class="subscribe-form" name="Unit42_Subscribe" id="unit42footerSubscription_form">
  <input type="hidden" name="emailFormMask" value="">
  <input type="hidden" value="1086" name="formid">
  <input type="hidden" value="531-OCS-018" name="munchkinId">
  <input type="hidden" value="2141" name="lpId">
  <input type="hidden" value="1203" name="programId">
  <input type="hidden" value="1086" name="formVid">
  <input type="hidden" name="mkto_optinunit42" value="true">
  <input type="hidden" name="mkto_opt-in" value="true">
  <div class="form-group">
    <label for="newsletter-email" id="newsletter-email-label">Your Email</label>
    <input type="emal" placeholder="Your Email" name="Email" class="subscribe-field" id="newsletter-email" aria-labelledby="newsletter-email-label">
    <p class="error-mail mb-15 text-danger" style="color: #dc3545"></p>
    <p>Subscribe for email updates to all Unit 42 threat research.<br>By submitting this form, you agree to our
      <a title="Terms of Use" href="https://www.paloaltonetworks.com/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="Get updates from Unit 42:Terms of Use">Terms of Use</a> and acknowledge our
      <a title="Privacy Statement" href="https://www.paloaltonetworks.com/legal-notices/privacy" data-page-track="true" data-page-track-value="Get updates from Unit 42:Privacy Statement">Privacy Statement.</a></p>
    <div class="g-recaptcha" data-expired-callback="captchaExpires" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
    <p class="error-recaptcha d-none mt-15 text-danger" style="color: #dc3545">Invalid captcha!</p>
    <button class="l-btn is-disabled" data-page-track="true" data-page-track-value="footer:Get updates from Unit 42:Subscribe" id="unit42footerSubscription_form_button"> Subscribe <img class="lozad"
        data-src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/right-arrow.svg" alt="Right Arrow">
      <img src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/icon-loader.svg" alt="loader" class="loader">
    </button>
    <div class="form-success-message"></div>
  </div>
</form>

Text Content

Menu
 * Tools
 * ATOMs
 * Security Consulting
 * About Us
 * Under Attack?

 * 
 * About Unit 42
 * Services
   Services
   Assess and Test Your Security Controls
    * AI Security Assessment
    * Attack Surface Assessment
    * Breach Readiness Review
    * BEC Readiness Assessment
    * Cloud Security Assessment
    * Compromise Assessment
    * Cyber Risk Assessment
    * M&A Cyber Due Diligence
    * Penetration Testing
    * Purple Team Exercises
    * Ransomware Readiness Assessment
    * SOC Assessment
    * Supply Chain Risk Assessment
    * Tabletop Exercises
    * Unit 42 Retainer
   
   Transform Your Security Strategy
    * IR Plan Development and Review
    * Security Program Design
    * Virtual CISO
    * Zero Trust Advisory
   
   Respond in Record Time
    * Cloud Incident Response
    * Digital Forensics
    * Incident Response
    * Managed Detection and Response
    * Managed Threat Hunting
    * Unit 42 Retainer
   
   UNIT 42 RETAINER
   
   Custom-built to fit your organization's needs, you can choose to allocate
   your retainer hours to any of our offerings, including proactive cyber risk
   management services. Learn how you can put the world-class Unit 42 Incident
   Response team on speed dial.
   
   Learn more
 * Unit 42 Threat Research
   Unit 42 Threat Research
   Unit 42 Threat Research
    * Threat Briefs and Assessments
      Details on the latest cyber threats
    * Tools
      Lists of public tools released by our team
    * Threat Reports
      Downloadable, in-depth research reports
   
   THREAT REPORT
   
   2024 Unit 42 Incident Response Report
   
   Read now
   THREAT BRIEF
   
   Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats
   Including DDoS, HermeticWiper, Gamaredon, Website Defacement
   
   Learn more
   THREAT REPORT
   
   Highlights from the Unit 42 Cloud Threat Report, Volume 6
   
   Learn more
 * Partners
   Partners
   Partners
    * Threat Intelligence Sharing
    * Law Firms and Insurance Providers
   
   THREAT REPORT
   
   2022 Unit 42 Ransomware Threat Report: Understand trends and tactics to
   bolster defenses
   
   Learn more
   THREAT BRIEF
   
   Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats
   Including DDoS, HermeticWiper, Gamaredon, Website Defacement
   
   Learn more
   THREAT BRIEF
   
   Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email
   Compromise Ring Members
   
   Learn more
 * Resources
   Resources
   Resources
    * Research Reports
    * Webinars
    * Customer Stories
    * Datasheets
    * Videos
    * Infographics
    * Whitepapers
    * Cyberpedia
   
   Industries
    * Financial Services
    * Healthcare
    * Manufacturing
   
   ANALYST REPORT
   
   Unit 42® has been named a Leader in “The Forrester Wave™: Cybersecurity
   Incident Response Services, Q2 2024.” Read the Forrester report to learn why.
   
   Get the report
   THREAT REPORT
   
   Unit 42 Threat Frontier Report: Discover the latest insights on how threat
   actors are leveraging GenAI to exploit vulnerabilities — and learn what steps
   you can take to protect yourself.
   
   Get the report

 * 
 * Under Attack?




Search
All
 * Tech Docs


Close search modal

 * Threat Research Center
 * Threat Research
 * Business Email Compromise

Business Email Compromise


EFFECTIVE PHISHING CAMPAIGN TARGETING EUROPEAN COMPANIES AND INSTITUTIONS

10 min read
Related Products
Advanced DNS SecurityAdvanced URL FilteringAdvanced WildFireCloud-Delivered
Security ServicesCortexCortex XDRCortex XSIAMManaged Threat HuntingUnit 42
Incident Response
 * By:
    * Shachar Roitman
    * Ohad Benyamin Maimon
    * William Gamazo

 * Published:December 18, 2024
 * Categories:
    * Business Email Compromise
    * Threat Research

 * Tags:
    * CRM
    * Docusign
    * EMEA
    * Germany
    * HubSpot
    * Malicious Domains
    * Manufacturing
    * Microsoft Azure
    * MITRE
    * Redirection
    * United Kingdom

 * 
 * 

Share
 * 
 * 
 * 
 * 
 * 
 * 
 * 


EXECUTIVE SUMMARY

Unit 42 researchers recently investigated a phishing campaign targeting European
companies, including in Germany and the UK. Our investigation revealed that the
campaign aimed to harvest account credentials and take over the victim’s
Microsoft Azure cloud infrastructure.

The campaign’s phishing attempts peaked in June 2024, with fake forms created
using the HubSpot Free Form Builder service. Our telemetry indicates the threat
actor successfully targeted roughly 20,000 users across various European
companies.

Our investigation revealed that while the campaign appears to have begun in June
2024, the phishing campaign was still active as of September 2024. The campaign
targeted European companies in the following industries:

 * Automotive
 * Chemical
 * Industrial compound manufacturing

Palo Alto Networks customers are better protected from the threats discussed in
this article through the following products and services:

 * Advanced WildFire
 * Advanced URL Filtering and Advanced DNS Security
 * Cortex XDR and XSIAM
 * Unit 42 Managed Services Team

If you think you might have been compromised or have an urgent matter, contact
the Unit 42 Incident Response team.

 

Related Unit 42 Topics Phishing, Malicious Domains, Microsoft Azure


THE PHISHING OPERATION

In June 2024, Unit 42 researchers identified a phishing campaign targeting at
least 20,000 European automotive, chemical and industrial compound manufacturing
users. The phishing emails contained either an attached Docusign-enabled PDF
file or an embedded HTML link directing victims to malicious HubSpot Free Form
Builder links embedded within phishing emails. HubSpot is a cloud-based customer
relationship management (CRM), marketing, sales and content management system
(CMS) operation platform.

Working with HubSpot security teams, we determined that HubSpot was not
compromised during this phishing campaign, nor were the Free Form Builder links
delivered to target victims via HubSpot infrastructure.

We reached out to Docusign and they responded with, “The trust, security and
privacy of our customers has always been at the core of Docusign’s business.
Since the time of this investigation, Docusign has implemented a number of
additional actions to strengthen our proactive preventative measures, which — to
date — have significantly decreased the number of signers receiving fraudulent
Docusign signature requests.”

Figure 1 shows a simplified diagram of the phishing operation. Attackers
sometimes used two levels of redirection to reach their credential harvesting
infrastructure.

Figure 1. Phishing operation flow.


Evidence showed that the threat actor targeted several phishing attempts toward
specific institutions. These phishing attempts came complete with thematic
dialogue specific to that organization’s brand and email address formatting.

Several malicious PDF attachments used the target organization’s name in the
file name, (i.e., CompanyName.pdf). Figure 2 shows an example of a malicious PDF
file mimicking a Docusign document.

Figure 2. Phishing lure theme.


Clicking “View Document” would redirect the victim to a Free Form with the
following URL format: https://share-eu1.hsforms[.]com/FORM-ID.

Figure 3 shows an example of a phishing attempt with embedded HTML.

Figure 3. Phishing embedded HTML.


Both the malicious PDF and HTML examples led victims to the Free Form window
shown in Figure 4 if they clicked through.

Figure 4. HubSpot Free Form.


The wording in the Free Form window “View Document on Microsoft Secured Cloud”
indicates that the phishing campaign is also targeting Microsoft accounts. We
verified that the phishing campaign did make several attempts to connect to the
victim’s Microsoft Azure cloud infrastructure.

Once the user clicked “View Document on Microsoft Secured Cloud,” they were
redirected to the threat actor’s credential harvesting pages. This page prompted
the victim to supply their login information for Microsoft Azure.

We also found evidence that this phishing campaign targeted users of European
organizations. Figure 5 below is an example of a phishing website designed to
target notaries in France.

Figure 5. Phishing targeting notary offices.


Although this phishing setup differs from the one we mentioned previously, we
found the attackers reused the same infrastructure. This infrastructure included
the registered first-level domain, which we’ll describe in more detail in a
later section.

A list of the Free Form URLs identified during this investigation is included in
the Indicators of Compromise section of this article.


IDENTIFYING SUSPICIOUS PHISHING EMAILS

By analyzing the phishing emails, we found two indicators helpful to identify
similar attacks. One was a tone of urgency, and the other was failing its
authentication checks.

Both of these are well-known phishing indicators, but due to their importance,
we have summarized each.

 * Tone of urgency:
   * Phishing emails often create urgency with phrases like “immediate action
     required” to pressure quick responses
 * Failed authentication checks:
   * A “Fail” outcome for the Sender Policy Framework (SPF) means the sender’s
     IP address is unauthorized to send emails on behalf of the domain,
     suggesting possible spoofing
   * A “Fail” outcome for DomainKeys Identified Mail (DKIM) indicates the
     email’s digital signature was not verified, implying it could have been
     altered or forged
   * A “Temporary Error” for Domain-based Message Authentication, Reporting and
     Conformance (DMARC) points to a short-term issue with domain alignment,
     often due to server or DNS delays, weakening domain authentication.

Note: DMARC relies on successful SPF and DKIM checks to confirm domain
legitimacy, providing protection against spoofing and phishing.

In the snippet below, from the original mail attribute, we can see the
suspicious indicators mentioned above.

"Subject": "Completion Required XXXXXXXXX ", "AuthDetails": [ { "Name": "SPF",
"Value": "Fail" }, { "Name": "DKIM", "Value": "Fail" }, { "Name": "DMARC",
"Value": "Temporary error" }, ],
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
"Subject": "Completion Required XXXXXXXXX ",
 
"AuthDetails": [
 
{
 
"Name": "SPF",
 
"Value": "Fail"
 
},
 
{
 
"Name": "DKIM",
 
"Value": "Fail"
 
},
 
{
 
"Name": "DMARC",
 
"Value": "Temporary error"
 
},
 
],

Initial Access and Evasion Techniques

Adding their device to the authentication process allowed the threat actor to
make their logins appear to come from a trusted device. By using VPN proxies,
the threat actor’s login attempts originated from the same country as the victim
organization. However, Figure 6 shows that there were instances of login
attempts from previously blocked regions.

Figure 6. Impossible traveler - SSO alert information


Figure 7 provides an example of an alerting event in Cortex. These alerts
identify login events from uncommon or suspicious sources.

Figure 7. Impossible traveler - SSO alert details.


We also identified the use of a new Autonomous System Number (ASN) that had not
been seen in prior user activity. This added another layer of suspicion. Figure
8 shows another example of an alerting event that can notify security teams of
malicious login attempts.

Figure 8. First SSO access from ASN in organization alert details.


Finally, the threat actor employed unusual user-agent strings during their
connection attempts to the victim systems. An example of this custom user-agent
string from the phishing campaign was as follows:

Client=OWA;Action=ViaProxy
1
Client=OWA;Action=ViaProxy




THE PHISHING REDIRECTION

During the investigation, we identified at least 17 working Free Forms used to
redirect victims to different threat actor-controlled domains. The majority of
the identified domains were hosted at the top-level domain .buzz. Each of the
identified Free Forms contained a similar Microsoft Outlook Web App landing page
design and redirection pattern, shown in Figure 9.

Figure 9. Malicious Microsoft Outlook Web App landing page.


At the time of our investigation, the majority of the servers we identified that
were hosting phishing content used by the threat actor were offline. However, we
did find that two of these host servers were active, allowing us to collect the
phishing page source code. Both of the phishing source code samples that we
captured had the same structure.

The phishing code used a Base64-encoded URL designed for credential harvesting
and redirecting the victims to a Microsoft Outlook Web Access (OWA) login page.
Figure 10 shows a screenshot of the source code from the phishing page.

Figure 10. Microsoft OWA login page source code.


The sample source code revealed that the phishing links led victims to websites
using a URL that simulated the target victim organization’s name. The phishing
websites presented to the victim included their organization’s name followed by
the top-level domain .buzz (i.e., http[:]//www.acmeinc[.]buzz):

 * hxxps://<victim>.buzz/doc0024/index.php
 * hxxps://<victim>.buzz/2doc5/index.php


THE PHISHING INFRASTRUCTURE

The phishing campaign was hosted across various services, including Bulletproof
VPS hosts. This is a hosting service known for providing a high degree of
anonymity, lax enforcement of legal regulations and resistance to being shut
down. They are often associated with malicious operations, including phishing
operations.

One of the more interesting findings for us was the infrastructure clusters we
analyzed, from the compromised and targeted users we identified. By analyzing
telemetry collected from the victims, we found that the threat actor used the
same hosting infrastructure for multiple targeted phishing operations. They also
used this infrastructure for accessing compromised Microsoft Azure tenants
during the account takeover operation.

Figure 11 shows an example of such a cluster. The top line of the diagram, the
user layer, is indicated with the number 1. The victims are anonymized so as not
to identify the targeted and compromised users.

Figure 11. Threat actor’s infrastructure analysis diagram.


According to our telemetry, User A was compromised, resulting in their Microsoft
Azure tenant credentials also being exposed. Connections labeled with the word
access and indicated with the number 2 revealed that the threat actor used the
same phishing hosting infrastructure for network connection access to the
compromised user’s system.

The same infrastructure being used for both the phishing hosting infrastructure
as well as the direct connection to the victim environments suggests that the
threat actor owned the hosted server instead of renting or subscribing to a
shared “hosting” service.

The website forklog[.]com, indicated by the number 3 in the diagram, is an
online publication presented in both Russian and Ukrainian languages. The
contents of the publication focus on cryptocurrencies and blockchain
technologies. This domain was used by the threat actors within one of their
victim’s environments and points to a potential means of future victim targeting
or income generation.

We also found the compromised company associated with User A had a publicly
exposed control panel associated with a web hosting platform used to run and
automate cloud-based applications.

We found that the threat actor consistently scanned the control panel from the
same phishing infrastructure that deployed the phishing campaign redirection
hosts. We did not identify any successful attempts to access the control panel.


PERSISTENCE

During the account takeover, the threat actor added a new device to the victim’s
account. This allowed persistent access to the account, even as security efforts
were made to lock them out. Figure 12 displays an alert of suspicious resource
creation within the Microsoft Azure tenant.

Figure 12. Suspicious method addition to Azure account alert details.


When IT regained control of the account, the attacker immediately initiated a
password reset, attempting to regain control. This created a tug-of-war scenario
in which both parties struggled for control over the account. This resulted in
several additional alerts being triggered within the organization, shown in
Figure 13.

Figure 13. Azure Active Directory account unlock/successful password reset alert
details.



CONCLUSION

In this article, we reviewed a phishing campaign that targeted European
companies, including German and UK automakers and chemical manufacturing
organizations. Threat actors directed the phishing campaign to target the
victim’s Microsoft Azure cloud infrastructure via credential harvesting attacks
on the phishing victim’s endpoint computer. They then followed this activity
with lateral movement operations to the cloud.

The campaign’s phishing operation, which leveraged HubSpot Free Form builder
services, peaked in June 2024. We believe the threat actor successfully
compromised multiple victims in different companies across the targeted
countries.

Unit 42 researchers have an open dialogue with HubSpot in relation to the
phishing operations leveraging their services and have worked with them to
develop notifications and mitigation strategies. We have also worked with the
compromised organizations to ensure they have the resources they need to recover
from the phishing operation.

Detection and Mitigations

For Palo Alto Networks customers, our products and services provide the
following coverage associated with this group:

 * Advanced WildFire cloud-delivered malware analysis service accurately
   identifies the known samples as malicious.
 * Advanced URL Filtering and Advanced DNS Security identify domains associated
   with this group as malicious.
 * Cortex XDR and XSIAM detect user and credential-based threats by analyzing
   user activity from multiple data sources including endpoints, network
   firewalls, Active Directory, identity and access management solutions, and
   cloud workloads. Cortex builds behavioral profiles of user activity over time
   with machine learning. By comparing new activity to past activity, peer
   activity and the expected behavior of the entity, Cortex detects anomalous
   activity indicative of credential-based attacks.
 * Unit 42 Managed Detection and Response Service delivers continuous 24/7
   threat detection, investigation and response/remediation to customers of all
   sizes globally.

If you think you may have been compromised or have an urgent matter, get in
touch with the Unit 42 Incident Response team or call:

 * North America Toll-Free: 866.486.4842 (866.4.UNIT42)
 * EMEA: +31.20.299.3130
 * APAC: +65.6983.8730
 * Japan: +81.50.1790.0200

Palo Alto Networks has shared these findings, including file samples and
indicators of compromise, with our fellow Cyber Threat Alliance (CTA) members.
CTA members use this intelligence to rapidly deploy protections to their
customers and to systematically disrupt malicious cyber actors. Learn more about
the Cyber Threat Alliance.


APPENDIX


MITRE TECHNIQUES

Alert Name Alert Source ATT&CK Technique First SSO access from ASN in
organization XDR Analytics BIOC, Identity Analytics Valid Accounts: Domain
Accounts (T1078.002) First connection from a country in organization XDR
Analytics BIOC, Identity Analytics Compromise Accounts (T1586) Impossible
traveler - SSO XDR Analytics, Identity Analytics Compromise Accounts (T1586)
Suspicious authentication method addition to Azure account XDR Analytics,
Identity Analytics Persistence (TA0003)  Azure AD account unlock/password reset
attempt XDR Analytics BIOC, Identity Analytics Persistence (TA0003)  SSO with
abnormal user agent XDR Analytics BIOC, Identity Analytics Initial Access
(TA0001) Abnormal Communication to a Rare Domain XDR Analytics BIOC, Network
Analytics Command and Control (TA0011)


INDICATORS OF COMPROMISE


HUBSPOT FREE FORM URL LINKS

 * hxxps://share-eu1.hsforms[.]com/1P_6IFHnbRriC_DG56YzVhw2dz72l
 * hxxps://share-eu1.hsforms[.]com/1UgPJ18suRU-NEpmYkEwteg2ec0io
 * hxxps://share-eu1.hsforms[.]com/12-j0Y4sfQh-4pEV6VKVOeg2dzmbq
 * hxxps://share-eu1.hsforms[.]com/1cJJXJ0NfTPOKwn23oAmmzQ2e901x
 * hxxps://share-eu1.hsforms[.]com/1wg25r1Z-R5GkhY6k-xGzOg2dvcv5
 * hxxps://share-eu1.hsforms[.]com/1G-NQN9DbSVmDy1HDeovJCQ2ebgc6
 * hxxps://share-eu1.hsforms[.]com/1AEc2-gS4TuyQyAiMQfB5Qw2e5xq0
 * hxxp://share-eu1.hsforms[.]com/1wg25r1Z-R5GkhY6k-xGzOg2dvcv5
 * hxxps://share-eu1.hsforms[.]com/1zP2KsosARaGzLqdj2Umk6Q2ekgty
 * hxxps://share-eu1.hsforms[.]com/1fnJ8gX6kR_aa5HlRyJhuGw2ec8i2
 * hxxps://share-eu1.hsforms[.]com/1QPAfZcocSuu3AnqznjU14A2eabj0
 * hxxps://share-eu1.hsforms[.]com/176T8k3N9Q562OEEfhS22Fg2ebzvj
 * hxxps://share-eu1.hsforms[.]com/18wO3Zb9hTIuittmhHvQFuQ2ec8gt
 * hxxps://share-eu1.hsforms[.]com/1vNr8tB1GS4mZuYg81ji3dg2e08a3
 * hxxps://share-eu1.hsforms[.]com/1qe8ypRpdTr284rkNpgmoow2ebzty
 * hxxps://share-eu1.hsforms[.]com/1C1IZ0_b-SD6YXS66alL4EA2e90m9


PHISHING INFRASTRUCTURE URLS - LEVEL 1

 * hxxps://technicaldevelopment.industrialization[.]buzz/?o0B=RLNT
 * hxxps://vigaspino[.]com/2doc5/index.php?submissionGuid=1d51a08d-cf55-4146-8b5b-22caa765ac85
 * hxxps://technicaldevelopment.rljaccommodationstrust[.]buzz/?WKg=2Ljv8
 * hxxps://purchaseorder.vermeernigeria[.]buzz/?cKg=C3&submissionGuid=4631b0c9-5e10-4d81-b1d6-4d01045907e7
 * hxxps://asdrfghjk3wr4e5yr6uyjhgb.mhp-hotels[.]buzz/?Nhv3zM=xI7Kyf
 * hxxps://purchaseorder.europeanfreightleaders[.]buzz/?Mt=zqoE&submissionGuid=476f32d0-e667-4a18-830b-f57a2b401fc3
 * hxxps://orderspecification.tekfenconstruction[.]buzz/?6BI=AmaPH&submissionGuid=e2ce33ea-ee47-4829-882c-592217dea521
 * hxxps://asdrfghjk3wr4e5yr6uyjhgb.mhp-hotels[.]buzz/?Nhv3zM=xI7Kyf
 * hxxps://d2715zbmeirdja.cloudfront[.]net/?__hstc=251652889.fcaff35c15872a69c6757196acd79173.1727206111338.1727206111338.1727206111338.1&__hssc=251652889.158.1727206111338&__hsfp=1134454612&submissionGuid=30359eaf-a821-472d-ba17-dd2bd0d96b96
 * hxxps://docusharepoint.fundament-advisory[.]buzz/?3aGw=Nl9
 * hxxps://wr43wer3ee.cyptech[.]com[.]au/oeeo4/ewi9ew/mnph_term=?/&submissionGuid=50aa078a-fb48-4fec-86df-29f40a680602
 * hxxp://orderconfirmation.dgpropertyconsultants[.]buzz/
 * hxxps://espersonal[.]org/doc0024/index.php?submissionGuid=6e59d483-9dc2-48f8-ad5a-c2d2ec8f4569
 * hxxps://vigaspino[.]com/2doc5/index.php?submissionGuid=093410a5-c228-4ddf-890c-861cdc6fe5d8
 * hxxps://technicaldevelopment.industrialization[.]buzz/?o0B=RLNT
 * hxxps://espersonal[.]org/doc0024/index.php?submissionGuid=96a9b82a-55d3-402d-9af4-c2c5361daf5c
 * hxxps://orderconfirmating.symmetric[.]buzz/?df=ZUvkMN&submissionGuid=e06a1f83-c24e-4106-b415-d2f43a06a048


PHISHING INFRASTRUCTURE URLS - LEVEL 2

 * hxxps://docs.doc2rprevn[.]buzz?username=
 * hxxps://docusharepoint.fundament-advisory[.]buzz/?3aGw=Nl9
 * hxxps://9qe.daginvusc[.]com/miUxeH/
 * hxxps://docs.doc2rprevn[.]buzz/?username=
 * hxxps://vomc.qeanonsop[.]xyz/?hh5=IY&username=ian@deloitte.es
 * hxxps://sensational-valkyrie-686c5f.netlify[.]app/?e=


IP ADDRESSES

 * 167.114.27[.]228
 * 144.217.158[.]133
 * 208.115.208[.]118
 * 13.40.68[.]32
 * 18.67.38[.]155
 * 91.92.245[.]39
 * 91.92.244[.]131
 * 91.92.253[.]66
 * 94.156.71[.]208
 * 91.92.242[.]68
 * 91.92.253[.]66
 * 188.166.3[.]116
 * 104.21.25[.]8
 * 172.67.221[.]137
 * 49.12.110[.]250
 * 74.119.239[.]234
 * 208.91.198[.]96
 * 94.46.246[.]46


PDFS

 * (Zoomtan.pdf)
   b2ca9c6859598255cd92700de1c217a595adb93093a43995c8bb7af94974f067
 * (Belzona.pdf)
   f3f0bf362f7313d87fcfefcd6a80ab0f18bc6c5517d047be186f7b81a979ff91
 * (Pcc.pdf) deff0a6fbf88428ddef2ee3c4d857697d341c35110e4c1208717d9cce1897a21


XDR QUERIES

Cortex XDR queries to detect the presence of the operations explained within the
article can be found in the link on our GitHub.


POINTS TO CONSIDER DURING REMEDIATION

 * Microsoft Entra ID consideration:
   * Ensure that any compromised user's Microsoft Entra ID account is disabled
     until any ongoing investigation and eradication operations are completed.
 * Revoke users’ session:
   * When marking a user as compromised in Azure Entra ID, using the “revoke
     sessions” function, be aware that this action will not terminate active
     sessions.
   * Revoking sessions will only invalidate the Primary Refresh Token, allowing
     the threat actor to maintain access until their current Access Token
     expires, typically within 60-90 minutes.
   * While you should still mark the user as compromised and revoke sessions to
     prevent new access tokens from being issued, consider implementing
     Continuous Access Evaluation to address this limitation and enhance
     security by allowing real-time session management.
 * Disable “Self-Service Tenant Creation”:
   * This feature enables internal users to create a new tenant, which threat
     actors may exploit to exfiltrate data.

Back to top


TAGS

 * CRM
 * Docusign
 * EMEA
 * Germany
 * HubSpot
 * Malicious Domains
 * Manufacturing
 * Microsoft Azure
 * MITRE
 * Redirection
 * United Kingdom

Threat Research Center Next: LDAP Enumeration: Unveiling the Double-Edged Sword
of Active Directory


TABLE OF CONTENTS

 * 
 * Executive Summary
 * The Phishing Operation
 * Identifying Suspicious Phishing Emails
 * The Phishing Redirection
 * The Phishing Infrastructure
 * Persistence
 * Conclusion
 * Appendix
   * MITRE Techniques
 * Indicators of Compromise
   * HubSpot Free Form URL Links
   * Phishing Infrastructure URLs - Level 1
   * Phishing Infrastructure URLs - Level 2
   * IP Addresses
   * PDFs
 * XDR Queries
   * Points To Consider During Remediation


RELATED ARTICLES

 * Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow
   Integration
 * Network Abuses Leveraging High-Profile Events: Suspicious Domain
   Registrations and Other Scams
 * Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomware


RELATED BUSINESS EMAIL COMPROMISE RESOURCES

Threat Research October 7, 2021

SILVERTERRIER – NIGERIAN BUSINESS EMAIL COMPROMISE

 * SilverTerrier
 * Law Enforcement

Read now
Threat Research September 30, 2021

CREDENTIAL HARVESTING AT SCALE WITHOUT MALWARE

 * Credential Harvesting

Read now
Threat Research May 7, 2020

SILVERTERRIER: NEW COVID-19 THEMED BUSINESS EMAIL COMPROMISE SCHEMES

 * COVID
 * Syndicate Orion
 * SilverTerrier

Read now
Threat Actor Groups November 14, 2024

FAKE NORTH KOREAN IT WORKER LINKED TO BEAVERTAIL VIDEO CONFERENCE APP PHISHING
ATTACK

 * North Korea
 * Lazarus
 * BeaverTail

Read now
Threat Research September 24, 2024

INVESTIGATING INFRASTRUCTURE AND TACTICS OF PHISHING-AS-A-SERVICE PLATFORM
SNIPER DZ

 * Phishing Kit

Read now
Threat Research September 11, 2024

PHISHING PAGES DELIVERED THROUGH REFRESH HTTP RESPONSE HEADER

 * Phishing

Read now
Threat Research March 3, 2023

SPIKE IN LOKIBOT ACTIVITY DURING FINAL WEEK OF 2022

 * Information stealer
 * LokiBot
 * Machine Learning

Read now
Threat Research May 25, 2022

OPERATION DELILAH: UNIT 42 HELPS INTERPOL IDENTIFY NIGERIAN BUSINESS EMAIL
COMPROMISE ACTOR

 * Nigeria
 * SilverTerrier
 * Syndicate Orion

Read now
Threat Research January 19, 2022

OPERATION FALCON II: UNIT 42 HELPS INTERPOL IDENTIFY NIGERIAN BUSINESS EMAIL
COMPROMISE RING MEMBERS

 * Nigeria
 * SilverTerrier
 * Syndicate Orion

Read now
Threat Research October 7, 2021

SILVERTERRIER – NIGERIAN BUSINESS EMAIL COMPROMISE

 * SilverTerrier
 * Law Enforcement

Read now
Threat Research September 30, 2021

CREDENTIAL HARVESTING AT SCALE WITHOUT MALWARE

 * Credential Harvesting

Read now
Threat Research May 7, 2020

SILVERTERRIER: NEW COVID-19 THEMED BUSINESS EMAIL COMPROMISE SCHEMES

 * COVID
 * Syndicate Orion
 * SilverTerrier

Read now
Threat Actor Groups November 14, 2024

FAKE NORTH KOREAN IT WORKER LINKED TO BEAVERTAIL VIDEO CONFERENCE APP PHISHING
ATTACK

 * North Korea
 * Lazarus
 * BeaverTail

Read now
Threat Research September 24, 2024

INVESTIGATING INFRASTRUCTURE AND TACTICS OF PHISHING-AS-A-SERVICE PLATFORM
SNIPER DZ

 * Phishing Kit

Read now
Threat Research September 11, 2024

PHISHING PAGES DELIVERED THROUGH REFRESH HTTP RESPONSE HEADER

 * Phishing

Read now
Threat Research March 3, 2023

SPIKE IN LOKIBOT ACTIVITY DURING FINAL WEEK OF 2022

 * Information stealer
 * LokiBot
 * Machine Learning

Read now
Threat Research May 25, 2022

OPERATION DELILAH: UNIT 42 HELPS INTERPOL IDENTIFY NIGERIAN BUSINESS EMAIL
COMPROMISE ACTOR

 * Nigeria
 * SilverTerrier
 * Syndicate Orion

Read now
Threat Research January 19, 2022

OPERATION FALCON II: UNIT 42 HELPS INTERPOL IDENTIFY NIGERIAN BUSINESS EMAIL
COMPROMISE RING MEMBERS

 * Nigeria
 * SilverTerrier
 * Syndicate Orion

Read now
Threat Research October 7, 2021

SILVERTERRIER – NIGERIAN BUSINESS EMAIL COMPROMISE

 * SilverTerrier
 * Law Enforcement

Read now
Threat Research September 30, 2021

CREDENTIAL HARVESTING AT SCALE WITHOUT MALWARE

 * Credential Harvesting

Read now
Threat Research May 7, 2020

SILVERTERRIER: NEW COVID-19 THEMED BUSINESS EMAIL COMPROMISE SCHEMES

 * COVID
 * Syndicate Orion
 * SilverTerrier

Read now
 * 
 * 


Get updates from Unit 42


PEACE OF MIND COMES FROM STAYING AHEAD OF THREATS. CONTACT US TODAY.

Your Email



Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our
Privacy Statement.



Invalid captcha!

Subscribe



PRODUCTS AND SERVICES

 * Network Security Platform
 * CLOUD DELIVERED SECURITY SERVICES
 * Advanced Threat Prevention
 * DNS Security
 * Data Loss Prevention
 * IoT Security

 * Next-Generation Firewalls
 * Hardware Firewalls
 * Strata Cloud Manager

 * SECURE ACCESS SERVICE EDGE
 * Prisma Access
 * Prisma SD-WAN
 * Autonomous Digital Experience Management
 * Cloud Access Security Broker
 * Zero Trust Network Access

 * Code to Cloud Platform
 * Prisma Cloud
 * Cloud-Native Application Protection Platform

 * AI-Driven Security Operations Platform
 * Cortex XDR
 * Cortex XSOAR
 * Cortex Xpanse
 * Cortex XSIAM
 * External Attack Surface Protection
 * Security Automation
 * Threat Prevention, Detection & Response

 * Threat Intel and Incident Response Services
 * Proactive Assessments
 * Incident Response
 * Transform Your Security Strategy
 * Discover Threat Intelligence


COMPANY

 * About Us
 * Careers
 * Contact Us
 * Corporate Responsibility
 * Customers
 * Investor Relations
 * Location
 * Newsroom


POPULAR LINKS

 * Blog
 * Communities
 * Content Library
 * Cyberpedia
 * Event Center
 * Manage Email Preferences
 * Products A-Z
 * Product Certifications
 * Report a Vulnerability
 * Sitemap
 * Tech Docs
 * Unit 42
 * Do Not Sell or Share My Personal Information

 * Privacy
 * Trust Center
 * Terms of Use
 * Documents


Copyright © 2024 Palo Alto Networks. All Rights Reserved
 * 
 * 
 * 
 * 
 * 

EN
 * Select your language
 * USA (ENGLISH)


Your browser does not support the video tag.


DEFAULT HEADING

Read the article
Seekbar



Volume
This site uses cookies essential to its operation, for analytics, and for
personalized content and ads. Please read our privacy statement for more
information.Privacy statement
Cookies Settings Reject All Accept All


Your Opt Out Preference Signal is Honored


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information on cookie consent
Allow All


MANAGE YOUR CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices