Microsoft revealed about a phishing attack group’s new techniques in which a ‘jigsaw puzzle’ technique plus unusual features like Morse code dashes and dots were used to hide its attacks.
The group uses invoices in Excel HTML or web documents to distribute forms that capture credentials for later hacking efforts. The technique bypasses traditional email filter systems.
The attachment looks like a jigsaw puzzle. The individual segments of the HMTL file may look harmless at the code level and may thus slip past conventional security solutions. Only when these segments are put together and properly decoded does the malicious intent show.
The main aim of the attack is to collect usernames and passwords, but it also collects profit data such as IP address and location to use for subsequent breach attempts.
This phishing campaign is unique due to the effort taken to encode the HTML file to bypass security controls.
The XLS.HTML phishing campaign uses social engineering to craft emails pretending to be regular financial-related business transactions. In some of the emails, attackers use accented characters in the subject line.
xls is used in the attachment file name to make users believe it to be an Excel file. When the attachment is opened, it launches a browser window and displays a fake Microsoft Office 365 credentials dialog box on top of a blurred Excel document. The dialog box may display information about its targets, such as their email address and, in some instances, their company logo.
Image Credits : Commprise