Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time
New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in.
September 11, 2020
Serving as yet another proof point of the creativity with which attackers are targeting Office 365 users with new phishing schemes, Armorblox researchers yesterday detailed a new attack technique they found that validates stolen credentials in real time as the victim enters them into the login lure.
The attack in question is part of a very targeted spear-phishing campaign that was discovered operating against an executive at a top 50 American company. It works like this: Attackers send a typical credential phishing email using Amazon Simple Email Service to pass DKIM and SPF checks. Attached to the message is a bogus payment remittance report that looks like a text file with a title along the lines of "ACH Company Name."
Opening that file automatically opens up a look-alike Office 365 sign-on page with the user's email address already pre-entered, with a message that says, "Because you're accessing sensitive info, you need to verify your password."
All of these steps are fairly standard, but what happens next is what differentiates this attack from others. When a victim enters a password into the fake login screen, that triggers a call to Office 365 APIs to actively validate that username/password combination against that organization's Azure Active Directory infrastructure.
"This immediate feedback allows the attacker to respond intelligently during the attack," wrote Team Armorblox in a blog post about the attack. "The attacker is also immediately aware of a live, compromised credential and allows him to potentially ingratiate himself into the compromised account before any remediation."
If the login verification is successful, the user is redirected to zoom.com, likely as a diversionary tactic to make the process look like a benign glitch. If the authentication fails, the user is directed to login.microsoftonline.com, likely to hide the phishing attempt as a failed sign-on at the Office 365 portal.
In examining the attack, Armorblox found limited activity at the website hosting the attack. In addition, along with the timing of the lure email being sent — it was a Friday evening — the attack was carefully leveraged against that executive and organization.
"Our estimates show there have been 120-odd visits to this website globally since the beginning of June. The sparse number shows that the phishing scams are likely targeted and not spray and pray," they wrote.
This is one example of many new and creative ways to exploit the interconnected nature of the Office 365 ecosystem through various phishing and business email compromise (BEC) schemes.
For example, in late July Abnormal Security researchers reported an attack concocted to look like automated Sharepoint messages to snag employee credentials. And in early August researchers with Trend Micro reported a wave of BEC campaigns that have been targeting the Office 365 accounts of business executives since March. Meantime, a study released by Ironscales several weeks ago found some 9,500 different fake Microsoft login pages lurking online, all connected to different campaigns targeting Office 365.
At Black Hat USA this year, researchers Josh Madeley and Doug Bienstock presented on a range of different kind of tactics, techniques, and procedures (TTP) used by attackers against Office 365. They said the ecosystem has grown increasingly interesting to attackers as more enterprises fully embrace it for a range of different applications that reach far beyond email.
"A lot of organizations have lifted their on-premise Exchange environment into the cloud without much consideration or awareness of the new risks and attacker vectors this exposes them to," according to Bienstock, in a separate interview. He explained that the combination of different valuable productivity environments like Outlook, OneDrive, SharePoint, and Teams open up a huge volume of sensitive data in a consolidated cloud platform. It's a vector ripe for attack, he pointed out.
In a recent Dark Reading News Desk interview during Black Hat, Madeley somewhat presaged the attack described by Armorblox by explaining that Azure Active Directory is a feature often overlooked as a threat vector for Office 365 organizations.
"It is, for most organizations, the authentication provider for their employees," he explained. "So if an attacker has access to that, they have access to sites that are integrated into active directory that are federated with Azure."
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024