Menu
Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users

Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users

The group targeted military agencies, embassies, defense contractors and media organizations, researchers from Trend Micro said

A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.

The group behind the attack campaign has been operating since at least 2007 according to researchers from Trend Micro, who published a research paper on Wednesday about the attacks they dubbed Operation Pawn Storm.

The Pawn Storm attackers have used a variety of techniques over the years to compromise their targets, including spear-phishing emails with malicious Microsoft Office attachments that installed a backdoor-type malware program called SEDNIT or Sofacy, or selective exploits injected into compromised legitimate websites.

The group used one particularly interesting technique in email phishing attacks against organizations that use the Outlook Web App (OWA), which is part of Microsoft's Office 365 service.

For each phishing attack, the group created two fake domains: one very similar to that of a third-party website known to the victims -- like that of an upcoming industry conference for example -- and one similar to the domain used by the targeted organization's Outlook Web App deployment.

The attackers then crafted phishing emails with a link to the fake third-party site where they hosted non-malicious JavaScript code whose purpose was twofold: to open the actual legitimate site in a new tab and to redirect the already opened Outlook Web App browser tab to a phishing page.

"The JavaScript made it appear that the victims' OWA sessions ended while at the same time, tricked them into reentering their credentials," the Trend Micro researchers wrote in their paper. "To do this, the attackers redirected victims to fake OWA log-in pages by setting their browsers' open windows property."

This technique does not exploit any vulnerabilities and works in any popular browser, including Internet Explorer, Mozilla Firefox, Google Chrome and Apple's Safari, the researchers said. However, two conditions need to be met: the victims need to use OWA and they need to click on the embedded links from OWA's preview pane, they said.

This can be a powerful attack, because the victims know they had a legitimate OWA session opened in that browser tab and might not check if the URL has changed before re-entering their credentials.

In addition to using domain names that were very similar to those used by the targeted organizations for their real OWA log-in pages, in some cases the attackers even purchased legitimate SSL certificates so that the victims' browsers display the HTTPS secure connection indicators for the phishing sites, the Trend Micro researchers said.

Among those targeted with this technique were employees of the U.S. private military company ACADEMI, formerly known as Blackwater; the Organization for Security and Co-operation in Europe (OSCE); the U.S. Department of State; U.S. government contractor SAIC; a multinational company based in Germany; the Vatican Embassy in Iraq; broadcasting companies in several countries; the defense ministries of France and Hungary, Pakistani military officials; Polish government employees, and military attachés from various countries.

The phishing baits used by the attackers included well-known events and conferences that their victims were interested in.

"Apart from effective phishing tactics, the threat actors used a combination of proven targeted attack staples to compromise systems and get in to target networks -- exploits and data-stealing malware," the Trend Micro researchers said. "SEDNIT variants particularly proved useful, as these allowed the threat actors to steal all manners of sensitive information from the victims' computers while effectively evading detection."


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Academitrend microsecurityAccess control and authenticationOrganization for Security and Co-operation in EuropespywareSAICmalware

Featured

Slideshows

Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Veritas honours top performing trans-Tasman partners

Veritas honours top performing trans-Tasman partners

Veritas honoured its top performing partners across the channel in Australia and New Zealand, recognising innovation and excellence on both sides of the Tasman. Revealed under the Vivid lights in Sydney, Intalock claimed the coveted Partner of the Year 2017 (Pacific) award, with Data#3 acknowledged for 12 months of strong growth across the market. Meanwhile, Datacom took home the New Zealand honours, with Global Storage and Insentra winning service provider and consulting awards respectively. Dicker Data was recognised as the standout distributor of the year, while Hitachi Data Systems claimed the alliance partner award. Photos by Bob Seary.

Veritas honours top performing trans-Tasman partners
Show Comments