HomeCII/OTUtilization of Cloud Files Enhances BEC Attacks Through Creativity

Utilization of Cloud Files Enhances BEC Attacks Through Creativity

Published on

spot_img

Threat actors are taking their business email compromise (BEC) campaigns to the next level by merging social engineering tactics with the utilization of trustworthy, cloud-based file-hosting services, amplifying the authenticity of their attacks. These campaigns are surpassing common security measures and ultimately jeopardizing the identities of enterprise users.

In recent months, Microsoft has observed a surge in these hybrid campaigns that have been evolving over the past couple of years. Attackers are weaponizing legitimate file-sharing services like Dropbox, OneDrive, and SharePoint – platforms widely used by enterprises for collaboration – to perpetrate their malicious activities. This alert was highlighted by Microsoft Threat Intelligence, warning of the potential risks associated with these sophisticated cyberattacks.

The integration of social engineering techniques into these campaigns is key to their success. Threat actors are targeting trusted connections within a business user’s network and tailoring their lures around familiar topics of conversation. Through this strategy, they are effectively phishing credentials for business accounts, enabling them to carry out nefarious actions like financial fraud, data theft, and lateral movement to other endpoints.

Legitimate cloud services have become a weak link in enterprise security, with various threat actors, including advanced persistent threat (APT) groups, leveraging these services to deliver remote access Trojans (RATs), spyware, and other malicious software. By utilizing file-sharing services as their conduit, attackers can evade detection and maximize the impact of their malicious activities.

Microsoft outlined a common BEC attack scenario that begins with compromising a user within an organization. The attacker then leverages the victim’s credentials to upload a file on the company’s file-hosting service and shares it with individuals outside the organization who have established trust with the victim. By employing platforms like Dropbox, OneDrive, or SharePoint with restricted access, adversaries can circumvent detection systems and launch credential-harvesting operations with impunity.

Moreover, attackers are capitalizing on recipients’ trust in emails from known vendors, bypassing security measures by manipulating policies within collaboration products like Exchange Online. This tactic allows phishing emails linked to these attacks to go undetected, further emphasizing the effectiveness of these deceptive practices.

Once files are shared on the hosting service, the targeted individual receives a legitimate email notification to access the file securely, bypassing any protective barriers that may have otherwise intercepted suspicious messages. This notification acts as a trojan horse, facilitating the next stage of the attack campaign.

To evade detection further, attackers prompt users to verify their identities through familiar avenues, introducing urgency and leveraging psychological tactics to entice engagement with malicious files. The use of deceptive filenames enhances the credibility of these phishing attempts, increasing the likelihood of successful infiltration.

In response to these increasingly sophisticated BEC campaigns, Microsoft recommends that enterprises implement extended detection and response (XDR) systems to proactively identify suspicious activities associated with legitimate file-sharing services. By conducting queries to pinpoint anomalous file-sharing patterns and unusual sign-in events, organizations can strengthen their defenses against these evolving threats.

As threat actors continue to refine their tactics and exploit vulnerabilities in cloud-based services, it is imperative for enterprises to remain vigilant and implement robust cybersecurity measures to safeguard their sensitive information and protect their networks from exploitation.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...