Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
eSentire will be a Sponsor at the NetDeligence Cyber Risk Summit in Fort…
eSentire will be a Sponsor at the NetDeligence Cyber Risk Summit in…
eSentire is an exhibitor at RSAC 2023. Visit us at Booth 0535.
The Threat:
A recent Office365 phishing campaign has shown that threat actors are switching tactics to include the use of Google infrastructure. On October 16th, 2019, both eSentire and external sources observed the use of Google storage to host phishing pages [1]. The use of Google infrastructure has been implemented by threat actors in an attempt to bypass standard email protection. Employees and administrators are encouraged to review the phishing examples and recommendations below.
What we’re doing about it:
What you should do about it:
All Employees
Network/Email Administrators
Additional information:
Multiple phishing pages have been identified using storage.googleapis[.]com to host Office 365 credential phishing pages (Figure 1). These attacks are similar to previous phishing campaigns which exploited blob[.]core[.]windows[.]net and azurewebsites[.]net to host phishing pages. Preliminary investigations show that multiple phishing campaigns are employing a similar prefabricated phishing kit (Figure 3).
The October 16th, 2019 observed attacks were delivered through low effort phishing emails (Figure 2). If a user inserts credentials into the phishing page, the credentials are then sent to a credential drop site for storage (Figures 4 & 5).
Multi-factor authentication (MFA) phishing attempts were not identified in this campaign. It should be noted that attacks specifically targeting MFA have been identified in the wild [2]. Despite these instances, employing MFA is still considered a best security practice for prevent account compromise.
For more information on past phishing campaigns, see the eSentire advisories Office 365 Phishing Follow-Up and Hex Encoded Links Point to Phishing Pages on Microsoft Cloud Services [3] [4].
Figure 1: Office 365 credential phishing page[image src="/assets/fig1-v2.png" id="2469" width="500" height="391" class="leftAlone ss-htmleditorfield-file image" title="fig1 v2"]
Figure 2: Phishing Email leading to storage[.]googleapis[.]com credential phishing page
[image src="/assets/fig2-v3.png" id="2470" width="497" height="319" class="leftAlone ss-htmleditorfield-file image" title="fig2 v3"]
Figure 3: Phishing kit HTML
[image src="/assets/fig3-v2.png" id="2471" width="500" height="267" class="leftAlone ss-htmleditorfield-file image" title="fig3 v2"]
Figure 4: Credential Drop Site
[image src="/assets/fig4-v2.png" id="2472" width="444" height="260" class="leftAlone ss-htmleditorfield-file image" title="fig4 v2"]
Figure 5: Example of plain text phished credentials
[image src="/assets/fig5-v2.png" id="2473" width="288" height="349" class="leftAlone ss-htmleditorfield-file image" title="fig5 v2"]
Indicator Type |
Indicators of Compromise |
Description |
URL |
https://storage[.]googleapis[.]com/aoffice365-perpession-70360561/index[.]html |
Credential Phishing Page |
URL |
https://storage.googleapis[.]com/inboxvoicenotemsg/realm/recover[.]html |
Credential Phishing Page |
URL |
Credential Drop Site |
|
URL |
https://bertelgrenda[.]top/msgoff/azure2019/realm/send[.]php |
Credential Drop Site |
URL |
Credential Drop Site |
|
Email Address |
Sender Address |
References:
[1] https://twitter.com/KesaGataMe0/status/1184354076131151872
[2] https://info.publicintelligence.net/FBI-CircumventingMultiFactorAuthentication.pdf
[3] https://www.esentire.com/security-advisories/office-365-phishing-follow-up/