searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
Helga Labus
Helga Labus, Managing Editor, Help Net Security
August 10, 2023
Share

Microsoft 365 accounts of execs, managers hijacked through EvilProxy

A phishing campaign leveraging the EvilProxy phishing-as-a-service (PhaaS) tool has been spotted targeting Microsoft 365 user accounts of C-level executives and managers at over 100 organizations around the world.

The rise of phishing-as-a-service

As organizations increasingly employ multi-factor authentication (MFA), threat actors have switched to using phishing services such as EvilProxy, which uses reverse proxy and cookie injection methods to steal authentication credentials and session cookies (and thus bypass the extra protection offered by MFA).

“Nowadays, all an attacker needs is to set up a campaign using a point-and-click interface with customizable options, such as bot detection, proxy detection, and geofencing,” Proofpoint researchers noted.

“This relatively simple and low-cost interface has opened a floodgate of successful MFA phishing activity. One such interface and toolkit is EvilProxy, an all-inclusive phishing kit that is easy to acquire, configure, and set up.”

The campaign

Between March and June 2023, Proofpoint researchers detected an new phishing campaign targeting Microsoft 365 user accounts. About 120,000 phishing emails were sent to targeted organizations impersonating legitimate services such as DocuSign, Adobe, and SAP Concur.

When the victim clicks on the email link, they are first directed to a legitimate website (YouTube, SlickDeals, etc.) and then redirected through a series of other websites, to finally land on the phishing page created by EvilProxy, which mimicks recipient branding and attempts to handle third-party identity providers.

“If needed, these pages may request MFA credentials to facilitate a real, successful authentication on behalf of the victim – thus also validating the gathered credentials as legitimate,” the researchers noted.

EvilProxy Microsoft 365

The attack’s redirection chain. (Source: Proofpoint)

The attackers employed special encoding for the sent emails to hide them from automatic scanning tools, then they used legitimate, hacked websites to upload PHP code to decode the email address of each user.

“After decoding the email address, the user was forwarded to the final website – the actual phishing page, tailor-made just for that target’s organization,” the researchers noted. Once the attackers gained access to the victim’s account, they added their own multi-factor authentication method using “My Sign-Ins” to establish persistent access.

The targets

This specific campaign was extremely targeted; the attackers were selectively choosing “VIP” targets while disregarding those at the lowest level.

“Amongst the hundreds of compromised users, approximately 39% were C-level executives of which 17% were Chief Financial Officers, and 9% were Presidents and CEOs. Attackers have also shown interest in lower-level management, focusing their efforts on personnel with access to financial assets or sensitive information,” the researchers found.

As mentioned before, the targeted organizations are located around the world – but not Turkey. User traffic coming from Turkish IP addresses was redirected to a legitimate web page, the researchers noted.

More about
  • account hijacking
  • MFA
  • Microsoft 365
  • phishing
  • Proofpoint
Share this

Featured news

  • National Student Clearinghouse MOVEit breach impacts nearly 900 schools
  • Hands-on threat simulations: Empower cybersecurity teams to confidently combat threats
  • How global enterprises navigate the complex world of data privacy
CIS Benchmarks Communities: Where configurations meet consensus

Sponsored

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Free entry-level cybersecurity training and certification exam

Guide: Attack Surface Management (ASM)

Don't miss

National Student Clearinghouse MOVEit breach impacts nearly 900 schools

BinDiff: Open-source comparison tool for binary files

Hands-on threat simulations: Empower cybersecurity teams to confidently combat threats

How global enterprises navigate the complex world of data privacy

Balancing cybersecurity with convenience and progress

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us