Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Cybercriminals have found a devious new way to trick you with phishing scams
#1
Cybercriminals are constantly changing their tactics in order for their attacks to avoid detection and security researchers from GreatHorn have discovered a new phishing campaign capable of bypassing traditional URL defenses.

While many phishing scams involve changing the letters of a popular site's URL in order to trick users into navigating to fake landing pages, this new campaign changes the symbols used in the prefix that goes before the URL.

The URLs used in the campaign are malformed and don't utilize normal URL protocols such as http:// or https://. Instead, they use http:/\ in their URL prefix. As a colon and two forward slashes have always been used in the standard URL format, most browsers automatically ignore this factor.

As a result, the cybercriminals behind this new campaign are able to ensure that their phishing pages are able to get around many email scanners and reach their intended targets.

Malformed prefix attacks
According to a new blog post from the GreatHorn Threat Intelligence Team, these malformed prefix attacks first emerged in October of last year and gained momentum through the end of the year. In fact, between the first week of January and early February, the volume of email phishing attacks utilizing malformed URL prefixes increased by a whopping 5,933 percent.

While these phishing attempts have been identified at organizations across a variety of industries, organizations in the pharmaceutical, lending, construction and cable verticals are being targeted at a higher rate than others. Additionally, organizations running Office 365 were the targets of these attacks at a much higher rate than those running Google Workspace as their cloud email environment.

In one such attack identified by GreatHorn, the phishing email led to a fake landing page that was nearly identical to a Microsoft Office login page. If an unsuspecting user tried to login on this page, they would be providing the attackers with their credentials which would give them access to their email contact lists and other sensitive data found in their cloud storage.

To prevent falling victim to a malformed prefix attack, GreatHorn recommends that organizations provide their employees with training on how to spot a suspicious URL prefix. At the same time though, security teams should search their organization's email for any messages containing URLs that match this threat pattern and remove them.


Source
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Avast Threat Report Discovers Cybercriminals Using Common Applications mrtrout 0 500 05-20-2023 , 05:33 PM
Last Post: mrtrout
  Cybercriminals devise ‘The Last of Us’ scams ahead of new series release mrtrout 0 590 01-15-2023 , 10:48 PM
Last Post: mrtrout
  Malware devs trick Windows validation with malformed certs mrtrout 0 615 09-24-2021 , 01:11 AM
Last Post: mrtrout
  Cybercriminals Publish Data Allegedly Stolen From Shell, Multiple Universities Bjyda 0 836 03-31-2021 , 12:18 PM
Last Post: Bjyda
  Cisco points to new tier of APT actors that behave more like cybercriminals Bjyda 0 851 02-23-2021 , 11:22 PM
Last Post: Bjyda

Forum Jump:


Users browsing this thread: 1 Guest(s)