

Rewterz Threat Alert – How TrickBot is Injected into Browsers
October 30, 2019
Rewterz Threat Alert – Maze Ransomware Attacks Italy in New Email Campaign
October 31, 2019
Rewterz Threat Alert – How TrickBot is Injected into Browsers
October 30, 2019
Rewterz Threat Alert – Maze Ransomware Attacks Italy in New Email Campaign
October 31, 2019Severity
Medium
Analysis Summary
A new phishing campaign is targeting a number of United Nations entities and humanitarian organizations with copies of their login portals hosted on copycat domains. According to Lookout’s report on this campaign, the phishing sites are mobile aware in order to display more legitimate-looking content. JavaScript code within the malicious webpage attempts to identify whether the site is being loaded on a mobile device. If so, the page is loaded in a mobile-friendly view, which also unintentionally truncates the URL it is hosting on, making it appear even more legitimate. Along with the traditional method of gathering submitted credentials and exfiltrating them to the attacker, these phishing sites also contain code to perform keylogging so that even if the user does not actually hit the submit button, data typed into the page is still collected. The two domains used in this campaign, and their associated subdomains, all used valid SSL certificate so that users were not presented with a warning by browsers, again furthering the legitimacy of the site. The researchers note that the while many of the SSL certificates that were in use have expired, some of the domains are still live and with valid certificates. Additionally, while analyzing the infrastructure hosting these sites, it was discovered that the ASN of the IPs the domains resolved to is known to have hosted malware in the past.


Impact
- Credential theft
- Exposure of sensitive information
Indicators of Compromise
URL
- fs[.]auth[.]wfp[.]org[.]adfs[.]ls[.]client-request-id[.]session-services[.]com
- logon[.]undp[.]org[.]adfs[.]ls[.]client-request-id[.]session-services[.]com
- sso[.]united[.]un[.]org[.]adfs[.]ls[.]clinet-request-id[.]session-services[.]com
- login[.]unicef[.]org[.]adfs[.]ls[.]client-request-id[.]session-services[.]com
- heritage[.]onelogin[.]com[.]login[.]service-ssl-check[.]com
- sts[.]ifrc[.]org[.]adfs[.]ls[.]client-request-id[.]session-services[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]ip[.]session-services[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]co[.]session-services[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]hi[.]session-services[.]com
- sso[.]ssrc[.]org[.]adfs[.]ls[.]client-request-id[.]63f91e15[.]service-ssl-check[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]uc[.]session-services[.]com
- eastwestcenter[.]org[.]owa[.]auth[.]logon[.]aspx[.]replacecurrent[.]service-ssl-check[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]br[.]session-services[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]client[.]us[.]service-ssl-check[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]client[.]al[.]service-ssl-check[.]com
- login[.]microsoftonline[.]com[.]common[.]oauth2[.]client[.]hi[.]service-ssl-check[.]com
- login[.]yahoo[.]com[.]manage-account[.]src-ym[.]lang-en-us[.]session-services[.]com
- login[.]aol[.]com[.]account[.]challenge[.]oauth[.]session-services[.]com
Remediation
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.