Worldwide Phishing Campaign Aims at Employees in 12 Different Industries

Cybersecurity experts at Group-IB have uncovered a sophisticated phishing campaign that is currently targeting employees across more than 30 companies spanning 12 different industries globally. This malicious operation has successfully disseminated over 200 harmful links aimed at capturing user login credentials, with sectors including energy, fashion, finance, aerospace, telecommunications, government, and manufacturing being particularly affected.

The attackers employ a range of advanced techniques to circumvent established email security measures. These tactics include the abuse of trusted domains, the use of dynamic company branding, and the impersonation of document platforms. The first approach involves embedding malicious URLs within reputable services such as Adobe and Google, making detection by security systems considerably more challenging. Additionally, the campaign uses fraudulent notifications from familiar services like DocuSign to entice users into clicking links that appear to lead to seemingly important documents.

Dynamic company branding enhances the effectiveness of the phishing attempts, as the attackers retrieve and display the logos and visual identity of the targeted organization directly from legitimate websites. This method not only increases the credibility of the phishing emails but makes users less suspicious. Notably, DocuSign has been a frequent target of cybercriminals utilizing its API to deliver malware-laden documents, with a recent spike indicating a 98% rise in phishing attempts involving this platform, particularly aimed at U.S. government entities.

Victims who engage with these malicious links are directed to convincingly crafted login pages pre-filled with their own email addresses. When users enter their credentials, the information is relayed to attackers in real time via Command-and-Control (C2) servers or Telegram bots, facilitating immediate unauthorized access to sensitive information. A review of the Telegram bot’s log indicated that credentials collected were not limited to individuals from a single company; rather, they spanned a diverse array of businesses and countries, all victimized by this ongoing cyber threat.

In response to this escalating phishing campaign, organizations are urged to bolster their cybersecurity defenses. Implementing multi-factor authentication can provide an essential layer of security. Employees should also receive training to critically evaluate unexpected document requests before acting. The integration of advanced email filtering systems is crucial for detecting and blocking potential threats, while regular monitoring of accounts can help identify unauthorized access and address breaches rapidly.

Given the ongoing nature of these attacks, vigilance is paramount for businesses to protect themselves against such persistent threats. Ensuring that security protocols are tight and that personnel are well-informed can significantly mitigate the risk posed by these evolving phishing tactics.

Utilizing the MITRE ATT&CK framework can aid in understanding the possible tactics used by the adversaries involved in these attacks. Techniques such as initial access, often through phishing, and credential dumping are likely components of this ongoing campaign, illustrating the need for businesses to remain informed and proactive in their cybersecurity strategies.

Source