Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Hackers exploit popular document publishing website for phishing attack
    Cyber Security

    Hackers exploit popular document publishing website for phishing attack

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 19, 2024Editorial DepartmentEmail Security/Social Engineering

    Phishing attack

    Threat actors are exploiting digital file publishing (DDP) websites hosted on platforms such as FlipSnack, Issuu, Marq, Publuu, RelayTo and Simplebooklet for phishing, credential harvesting and session token theft, once again highlighting how threat actors are re- Utilizing legitimate services for malicious purposes.

    “Hosting phishing lures on DDP sites increases the likelihood of a successful phishing attack because these sites typically have a good reputation, are less likely to appear on web filter block lists, and may appear familiar or familiar to others Users of these sites are instilled with a false sense of security. It’s legitimate,” Cisco Talos researcher Craig Jackson said last week.

    While attackers have used popular cloud services such as Google Drive, OneDrive, Dropbox, SharePoint, DocuSign and Oneflow to host phishing documents in the past, this latest development marks an escalation aimed at evading email security controls.

    Internet security

    The DDP service allows users to upload and share PDF files in a browser-based interactive flipbook format, adding page-turning animations and other skeuomorphic effects to any catalog, brochure or magazine.

    We found that threat actors were abusing the free tiers or free trial periods offered by these services to create multiple accounts and publish malicious files.

    In addition to exploiting its good domain reputation, the attackers also exploited the fact that the DDP website facilitates temporary file hosting, allowing published content to automatically become unavailable after a predefined expiration date and time.

    Phishing attack

    In addition, built-in productivity features in DDP sites such as Publuu can act as a deterrent to prevent the extraction and detection of malicious links in phishing messages.

    In the incidents analyzed by Cisco Talos, DDP websites were integrated into the attack chain at a secondary or intermediate stage, typically by embedding links in phishing emails to files hosted on legitimate DDP websites.

    DDP-hosted files can serve as a gateway to external, adversary-controlled sites, either directly by clicking on links contained in the decoy file, or through a series of redirects (which also require solving a CAPTCHA to prevent automated analysis from working).

    Internet security

    The final login page is a fake website that mimics the Microsoft 365 login page, allowing the attacker to steal credentials or session tokens.

    “DDP sites can be a blind spot for defenders because trained users are unfamiliar with them and are less likely to be flagged by email and web content filtering controls,” Jackson said.

    “DDP websites create an advantage for threat actors trying to thwart contemporary phishing protections. The same features and benefits that attract legitimate users to these websites can be abused by threat actors to increase the effectiveness of phishing attacks.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.