In January, WordFence reported use of data URIs for effective phishing attacks against Gmail users. Now, Cyren is seeing the technique newly combined with another phishing favorite - HTML attachments - for use in a wide range of phishing attacks targeting, among others, customers of Wells Fargo, Venmo (digital wallet), PayPal, Chase, and Capital One.

Up to 50% of recent phishing attacks observed by Cyren have been based on HTM or HTML attachments.

URI-based phishing attacks

The Uniform Resource Identifier (URI) is a string of characters which is opened in the browser URL/search bar, and essentially includes all the data needed for a phishing page, including images. URLs are a subset of URIs (Uniform Resource Identifier) and only specify the location of a specific network resource and how it should be accessed.

The idea of using data URIs for attacks is not new; as far back as 2007 researchers Billy Rios and Nathan McFeters used the concept for attacks against Microsoft Internet Explorer 6 and 7. In 2012 Henning Klevjer, an information security student at the University of Oslo in Norway, published a research paper suggesting the use of URIs for phishing attacks. Attacks in the past month have introduced three new 'features' designed to make the phishing attack more effective:

1) The delivery method - disguising the URI link as PDF file icon.

2) including phony 'URL' text at the start of the URI. For example 'https://accounts.google.com/'

3) Adding spaces after the 'URL' to force the script part of the URI out of view on the URL/search bar

Now Cyren security analysts are seeing these new methods further enhanced by embedding the URI in an HTML file attachment. For example, in the PayPal phishing email shown below, the recipient is directed to download the attached HTML form and to fill in the 'required' fields.

The content of the HTML attachment is very similar to a version used to target Venmo users. The file mostly contains the URI with some HTML headers added on. Note the 'data:text' field in the HTML below which starts the URI.

There are several advantages of this approach for the phishers:

  • Many email security systems allow HTML attachments - as opposed to .exe attachments which are blocked
  • Very few email security systems actually scan the content of an HTML attachment and would therefore not detect the telltale 'data:text' URI header
  • If the 'data:text' URI header was in the body of the email (as opposed to the attachment) it might be detected, as more vendors have added detection for this potential threat
  • The email body contains no URLs that can be detected as phishing links
  • Once the user opens the attachment, the URI phishing page opens locally on the user PC. Communication (POST) of the phished credentials only happens once the user clicks on 'submit'.

The actual destination URL that the stolen credentials are sent to is obfuscated in the JavaScript code of the URI. This also prevents blocking of the email attachment in cases where this phishing URL is known.

Encrypted HTML POST phishing attack

A second version of the HTML attachment attack method uses a full HTML page of the target brand (as opposed to the URI technique described above). In this example a phishing email to a Chase customer requires recipients to open the HTML attachment for more info.

As above, the advantage of HTML attachments is that the phishing page is loaded locally in the browser and therefore URL filtering solutions cannot detect any network activity. The key to detecting and stopping this type of phishing attack is the POST of the phished credentials that takes place once the victim has filled in the Web form. However, a review of the HTML shows that the POST command and destination URL are encrypted. This prevents email security platforms from scanning the HTML attachment to detect the phishing URL.

In the video below we show how Cyren has decrypted the POST command and URL, and how we this data is then used in Cyren WebSecurity to protect a user who is trying to submit the phishing page.

Cyren Ltd. published this content on 14 February 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 14 February 2017 18:03:06 UTC.

Original documenthttps://blog.cyren.com/articles/new-phishing-attacks-use-uris-hidden-in-file-attachments.html

Public permalinkhttp://www.publicnow.com/view/B22407D3B91BB9C74857B669A062C80B53F00FDC