Headlines

EvilProxy Cyberattack: When Executives Become Targets in the Microsoft 365 Flood

EvilProxy Cyberattack: When Executives Become Targets in the Microsoft 365 Floodwordpress,cyberattack,EvilProxy,executives,Microsoft365,flood
<strong>EvilProxy</strong> Phishing Campaign Targets Microsoft 365 <em>Executives</em>: An Alarming Rise in Account Takeovers

Introduction

A recent phishing campaign known as EvilProxy has targeted thousands of Microsoft 365 user accounts worldwide. Over a three-month period between March and June, attackers sent 120,000 phishing emails to more than 100 organizations across the globe, with the primary goal of taking over C-suite and executive accounts. This approach allows the attackers to conduct further attacks deeper within the enterprise. Researchers from Proofpoint have revealed that this ongoing campaign has seen a significant surge of more than 100% in takeovers over the last six months.

The Tactics Used

The EvilProxy phishing campaign employs a combination of tactics, including brand impersonation, scan blocking, and a multi-step infection chain. These tactics have proven successful in taking over the cloud accounts of top-level executives. Notably, the attackers have utilized EvilProxy, a phishing-as-a-service offering that leverages reverse proxy and cookie-injection methods. This allows them to bypass multi-factor authentication (MFA), which is often considered a preventive measure against phishing attacks.

EvilProxy and the Bypassing of MFA

The use of EvilProxy and similar reverse-proxy hacker tools has made it easier for bad actors to crack MFA. This is achieved by requesting MFA credentials, thus facilitating a real and successful authentication on behalf of the victim. The compromise of MFA-protected accounts is particularly noteworthy, as at least 35% of all compromised users during the past year had MFA enabled, according to Proofpoint’s researchers. Once the attackers obtained the credentials, they wasted no time in logging into executives‘ cloud accounts, gaining access in mere seconds. They then leveraged a native Microsoft 365 application to add their own MFA to the compromised accounts, solidifying their persistence.

The Anatomy of an EvilProxy Attack

A typical EvilProxy attack commences with the attackers impersonating trusted services such as Concur, DocuSign, and Adobe. They use spoofed email addresses to send phishing emails that appear to originate from these services, containing links to malicious Microsoft 365 phishing websites. Clicking on these links triggers a multi-step infection chain involving legitimate redirectors like YouTube, as well as techniques like malicious cookies and 404 redirects. This complex redirection process scatters the traffic in an unpredictable manner, reducing the chances of detection. Eventually, user traffic reaches an EvilProxy phishing framework, a landing page that functions as a reverse proxy, mimicking recipient branding and attempting to resemble third-party identity providers.

The Targeting of Executives

The EvilProxy attackers employed a highly targeted approach, primarily focusing on C-level executives. Approximately 39% of the attacks targeted C-level executives, with CFOs accounting for 17% of those targets and presidents and CEOs comprising 9%. This selective targeting allows the attackers to gain access to sensitive and valuable information within the organizations.

The Need for Advanced Security

The success of EvilProxy in breaching MFA highlights the evolving sophistication of phishing attacks. Organizations must respond by bolstering their security measures and maintaining a robust cybersecurity posture. Colin Little, a security engineer for cybersecurity firm Centripetal, emphasized the importance of proactive cybersecurity intelligence to monitor for unusual activities, emerging threats, and potential vulnerabilities.

The Role of Public Awareness

Proofpoint researchers found a concerning gap in public awareness regarding the risks and consequences associated with EvilProxy. To mitigate phishing attacks like EvilProxy, organizations should focus on blocking and monitoring malicious email threats, identifying account takeovers, and isolating potentially malicious sessions initiated by links embedded in email messages.

Conclusion

The EvilProxy phishing campaign targeting Microsoft 365 executives has revealed the alarming rise in account takeovers. The successful bypassing of MFA and the scale of the attacks demonstrate the need for organizations to strengthen their security measures. Proactive cybersecurity intelligence and robust phishing-mitigation efforts are crucial in mitigating the risks associated with evolving phishing tactics like EvilProxy. Increased public awareness of the risks and consequences is essential to preventing future attacks.

NOTE: This report is a fictional piece produced as an example of writing in the style of The New York Times.

Hacker-wordpress,cyberattack,EvilProxy,executives,Microsoft365,flood


EvilProxy Cyberattack: When Executives Become Targets in the Microsoft 365 Flood
<< photo by sebastiaan stam >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !