{"id":19404,"date":"2022-06-22T02:10:03","date_gmt":"2022-06-22T10:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/22\/news-13137\/"},"modified":"2022-06-22T02:10:03","modified_gmt":"2022-06-22T10:10:03","slug":"news-13137","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/22\/news-13137\/","title":{"rendered":"Watch out for the email that says &#8220;You have a new voicemail!&#8221;"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 22 Jun 2022 09:24:27 +0000<\/strong><\/p>\n<p>A phishing campaign is using voicemail notification messages to go after victims&#8217; Office 365 credentials.<\/p>\n<p>According to <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/resurgence-voicemail-themed-phishing-attacks-targeting-key-industry\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">researchers at ZScaler<\/a>, the campaign uses spoofed emails with an HTML attachment that contains encoded javascript.<\/p>\n<p>The email claims that you have a new voicemail and that you can listen to the message by clicking on the attachment. To add credibility, the name of the attachment starts with a music note character like f.e. \u266b to make it look like a sound clip. In reality, it is an HTML file with obfuscated javascript embedded.<\/p>\n<p>The javascript uses the <strong>windows.location.replace <\/strong><a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Location\/replace\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">method<\/a><strong> <\/strong>to redirect the target to a specially crafted phishing page. The access to the page is behind a reCAPTCHA, probably to keep out the bots, particularly any automated URL analysis tools.<\/p>\n<h2>Spoofed email<\/h2>\n<p>Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by attackers. Obviously pretending to be someone else can have its advantages especially if that someone else holds a position of power or trust with regards to the receiver.<\/p>\n<p>In this campaign the threat actors use a name in the &#8220;From&#8221; field of the email aligned with the targeted organization&#8217;s name. An internal mail is more likely to be trusted by the receiver. Analysis of the email headers shows that the attacker leveraged email servers located in Japan.<\/p>\n<h2>Targets<\/h2>\n<p>The final credential phishing page attempts to steal the Office 365 credentials of the users by presenting them with a fake login screen. The redirection URL includes the target\u2019s email address in base64 encoded, likely so the attackers will be able to match the victim and their login credentials.<\/p>\n<p>The researchers found the campaign targeting organizations in the US military, security software developers and providers, healthcare and pharmaceutical, and supply-chain organizations in manufacturing and shipping.<\/p>\n<h2>How to avoid being phished<\/h2>\n<ul>\n<li>Do not open unverified email attachments. If someone you know sends you an attachment you&#8217;re not expecting, check it is really them via another contact method.<\/li>\n<li>Do not enter your credentials before checking the actual URL of the site.<\/li>\n<li>If you use a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/password-manager\/\">password manager<\/a> that autofills your login details, it will not enter your credentials on a phishing site because it will have a different URL. This is a really handy giveaway that something is up.<\/li>\n<li>Enable <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\/\">2-factor authentication (2FA)<\/a>. If you hand over your password to a phishing page, the phisher can\u2019t do much with it while you\u2019re protected with 2FA. This isn&#8217;t foolproof though, as some phishing sites will also try to steal your 2FA codes.<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/06\/watch-out-for-the-email-that-says-you-have-a-new-voicemail\/\">Watch out for the email that says &#8220;You have a new voicemail!&#8221;<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/06\/watch-out-for-the-email-that-says-you-have-a-new-voicemail\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 22 Jun 2022 09:24:27 +0000<\/strong><\/p>\n<p>An email campaign lures users with a voicemail notification to enter their Office 365 credentials on a fake login page.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/06\/watch-out-for-the-email-that-says-you-have-a-new-voicemail\/\">Watch out for the email that says &#8220;You have a new voicemail!&#8221;<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10598,17374,11347,3924,10510,3925,19238],"class_list":["post-19404","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2fa","tag-office-365","tag-password-manager","tag-phishing","tag-social-engineering","tag-spoofing","tag-voicemail"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19404"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19404\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}