{"id":1405,"date":"2019-05-28T11:08:36","date_gmt":"2019-05-28T03:08:36","guid":{"rendered":"https:\/\/tongwing.woon.sg\/blog\/?p=1405"},"modified":"2019-05-28T11:12:09","modified_gmt":"2019-05-28T03:12:09","slug":"multi-hop-phishing-attack","status":"publish","type":"post","link":"https:\/\/tongwing.woon.sg\/blog\/multi-hop-phishing-attack\/","title":{"rendered":"Multi-hop Phishing Attack"},"content":{"rendered":"\n<p>Today I received an email from a business associate whom I often corresponded with. Even though the email looks normal &#8211; it contains his full name and the usual email signature &#8211; something looks off. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" loading=\"lazy\" width=\"697\" height=\"689\" src=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/2.png\" alt=\"\" class=\"wp-image-1406\" srcset=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/2.png 697w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/2-300x297.png 300w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/2-624x617.png 624w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/><\/figure>\n\n\n\n<p>The email body is very terse and contains only a link &#8211; alarm bells start going off. The link points to a valid Google docs document.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"550\" src=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/3-1024x550.png\" alt=\"\" class=\"wp-image-1407\" srcset=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/3-1024x550.png 1024w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/3-300x161.png 300w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/3-768x413.png 768w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/3-624x335.png 624w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/3.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The document contains 2 links, both pointing to the same external site. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"550\" src=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/4-1024x550.png\" alt=\"\" class=\"wp-image-1408\" srcset=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/4-1024x550.png 1024w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/4-300x161.png 300w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/4-768x413.png 768w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/4-624x335.png 624w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/4.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It is seemingly a login page for your Microsoft outlook account. <em>But the domain is not associated with Microsoft<\/em>. A classic phishing attack.<\/p>\n\n\n\n<p>It so happens that the business associate is using Outlook for his email. After entering his credentials into the phishing site, the attacker must have used his credentials to send a copy of the phishing email to everyone in his contacts. Indeed that is the case, after I have confirmed with other associates. What makes this attack so successful is that 1) the email is from someone you have corresponded with 2) the first link opens a valid Google docs and some would have let their guard down at this point of time.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/content.fireeye.com\/email\/rpt-email-threat-report-en\">latest report from FireEye<\/a> states that 91% of cyber attacks comes from emails, and email-based attacks are getting increasingly more sophisticated. Some are also taking advantage of how email addresses are being shown on mobile devices.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/content.fireeye.com\/email\/rpt-email-threat-report-en\"><img decoding=\"async\" loading=\"lazy\" width=\"850\" height=\"363\" src=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/6.png\" alt=\"Email Threat Report from FireEye\" class=\"wp-image-1410\" srcset=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/6.png 850w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/6-300x128.png 300w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/6-768x328.png 768w, https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/6-624x266.png 624w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/figure>\n\n\n\n<p>As cyber threats continue to evolve, we must continue to educate users on the importance of maintaining vigilance and to be mindful of the limitations of current solutions to address the risks of phishing and other attacks.<\/p>\n\n\n\n<p>Edit: I have submitted the phishing site to Google&#8217;s <a href=\"https:\/\/safebrowsing.google.com\/safebrowsing\/report_phish\/?hl=en\">Report Phishing Page<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I received an email from a business associate whom I often corresponded with. Even though the email looks normal &#8211; it contains his full name and the usual email signature &#8211; something looks off. The email body is very terse and contains only a link &#8211; alarm bells start going off. The link points [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31,10],"tags":[],"_links":{"self":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1405"}],"collection":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/comments?post=1405"}],"version-history":[{"count":2,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1405\/revisions"}],"predecessor-version":[{"id":1412,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1405\/revisions\/1412"}],"wp:attachment":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/media?parent=1405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/categories?post=1405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/tags?post=1405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}