2 min read

Phishing attack attempts to avoid URL scanning-based detection methods

Phishing attack attempts to avoid URL scanning-based detection methods

On the 7th of September 2022, we detected a new interesting technique used by a phishing attack to attempt to avoid URL scanning-based detection methods by redirecting to a random Wikipedia page. On the surface, the email seems like a generic password expiry phishing attempt which tries to convince the user that their password is expiring on that day and requests they access the link in the email.

This link is formatted as follows, “hxxp://COMPANYNAME[.]chasingpostcards[.]com/cGhpc2hpbmdAYXR0YWNrLmNvbQ==”. In the URL path a base 64 encoded email address is provided, in the URL example above the decoded address is “phishing@attack.com” which is used to format the phishing pages layout when a user clicks their customised link.  

Image showing a phishing email

Using a URL scanning service on the “hxxp://COMPANYNAME[.]chasingpostcards[.]com/cGhpc2hpbmdAYXR0YWNrLmNvbQ==” URL, we can see that the chasingpostcards website redirects to a Microsoft related Wikipedia page such as "https://en.wikipedia.org/wiki/Microsoft_365." The chasingpostcards link will redirect to Wikipedia if scanned by an automated URL scanner, this is a method of avoiding detection as if a URL scanner cannot access the intended phishing page it will not report back that the links are suspicious. 

Example of the Wikipedia page used to avoid URL detection

 

Interestingly when accessing the “hxxp://COMPANYNAME[.]chasingpostcards[.]com/cGhpc2hpbmdAYXR0YWNrLmNvbQ==” link from a local sandboxed environment, we get redirected to “hxxp://moneypro[.]in/O/ cGhpc2hpbmdAYXR0YWNrLmNvbQ==” a page containing a reCAPTCHA which is used to prevent bots from accessing the fake M365 phishing page.

The chasingpostcards address is used as a gateway to prevent detection by automated scanning tools, we believe this to use various methods to define whether the access is a “legitimate” user or a scanner such as browser fingerprinting and IP address lookup.  

Image showing the capture request

After completing the captcha, we are greeted with a fake M365 phishing page. 

Microsoft Phishing page

On this fake M365 login page there is a JavaScript script that can detect any user input without them clicking sign in. This method could capture a user’s passwords if they were to input the password into the field and then realise the site is not legitimate without clicking sign in. This could lead the targeted user to think they are safe and not compromised because they did not click sign in however this is not the case. 

Our MDR for Email service was able to detect this using a multitude of signals. For example, the language used in the email, was similar to the language of other Credential Theft emails, the SMTP server’s IP address was also marked as suspicious due to being associated with other emails that were marked as phishing by other Analysts on our service. Finally, the email address sender name is similar to a sender name already in the targeted user's contacts.  

Explore our MDR for email services.

Find out more

91% of cyber attacks start with an email

91% of cyber attacks start with an email

Email is the most common type of threat vector, and 23% of people click on malicious emails. It only takes one click for your whole network to be...

Read More
The gangs behind ransomware attacks

The gangs behind ransomware attacks

The gangs behind ransomware attacks

Read More
What to do if you fall victim to a cyber attack

What to do if you fall victim to a cyber attack

What to do if you fall victim to a cyberattack

Read More