• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Trickbot Banking Trojan hits North American Banks
February 12, 2019
Rewterz Threat Alert – DanaBot Malware Resurfaces with new features
February 13, 2019

Rewterz Threat Alert – Phishing Campaign Targeting Bank Employees in Pakistan, Forging Zimbra

February 12, 2019

Severity

Medium

Category

Phishing

Analysis Summary

A new Phishing campaign has been observed targeting bank employees in Pakistan. The email contains an attachment named “Overdue Payment” which looks like a PDF file. The email looks like this:

The attachment has a malicious link embedded in it. When the attachment is clicked, users are redirected to a phishing URL. The URL leads to a forged login page of Zimbra email application used by the employees of the targeted bank. While the original Zimbra page for the bank contains a logo of the bank, the forged page looked like this with a logo of Zimbra itself. However, the difference was still not very apparent for an unsuspecting victim.

What’s innovative in this phishing attack is that when the users were redirected to the login page of Zimbra, their email address associated with the bank was already written in the ‘username’ space, due to which, unsuspecting users might enter their password carelessly, thinking that they had been logged out of their legitimate Zimbra accounts by chance or due to session timeout.

Moreover, our analysts entered the malicious URL on Virus Total, which failed to detect it as malicious because it only focused on the first section of the URL which is Google. Upon closer observation, another URL was found within the main URL “https[:]//2ac43aa43bf473f9a9c09b4b608619d3.iyosyos.id/a9f0e61a137d86aa9db53465e0801612/?email%3D&source=gmail&ust=1549973345949000&usg=AFQjCNFqBoAl5ja-ctaA7FBIEryyEjeeeA” which was identified by Virus Total as a Phishing URL when searched separately.

Impact

Credential Theft

Indicators of Compromise


URLs

https[:]//2ac43aa43bf473f9a9c09b4b608619d3[.]iyosyos[.]id

Email Address

Kenny[@]s2sj[.]com

Email Subject

[BULK] New Protected Document for [target’s name]

Remediation


Block the Threat Indicators at their respective controls.

Since the threat actors are creating target-specific URL for each victim:

1) Never open unexpected emails or attachments received from unknown sources, even if they appear to be harmless.

2) Never enter credentials on any web page that appears by clicking on links received in emails.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.