21.4 C
New York
Friday, May 17, 2024

Two-stage Dropbox spear phishing | Kaspersky official weblog


Phishers are more and more utilizing refined focused assaults. Along with leveraging a wide range of reliable on-line providers, they make use of social engineering to trick the sufferer into following a hyperlink. We just lately uncovered one other in a collection of unconventional multi-stage phishing schemes that deserves a minimum of a warning to workers who deal with monetary paperwork.

The primary electronic mail

The assault begins with an electronic mail to the sufferer that seems to be from an actual auditing agency. In it, the sender says that they tried to ship an audited monetary assertion, however it was too giant to electronic mail, so it needed to be uploaded to Dropbox. Word that the e-mail is shipped from an actual deal with on the corporate’s mail server (the attackers probably hijacked the mailbox).

Email from auditing firm

The primary electronic mail from an “auditing agency” is meant to melt up the sufferer

From the angle of any mail safety system, this electronic mail is completely reliable – indistinguishable from regular enterprise correspondence. It incorporates no hyperlinks, comes from a reliable firm deal with, and merely informs the recipient of a failed try and ship an audit by way of electronic mail. This message is sure to get the eye of the accountant studying it. It incorporates a disclaimer that the content material is confidential and supposed solely for the recipient, and the corporate in whose title it was despatched has a big on-line presence. All in all, it appears fairly convincing.

The one small crimson flag is the knowledge that the report needed to be resent utilizing Dropbox Software Secured Add. There is no such thing as a such factor. A file uploaded to Dropbox might be password-protected, however nothing extra. The actual objective of this phrase is presumably to arrange the recipient for the truth that some type of authentication will likely be required to obtain the report.

The second electronic mail

Subsequent comes a notification immediately from Dropbox itself. It states that the auditor from the earlier electronic mail has shared a file known as “audited monetary statements” and requested that it’s reviewed, signed, and returned for processing.

Dropbox notification

A superbly regular Dropbox notification stating {that a} file has been shared with the recipient

There may be nothing suspicious about this electronic mail both. It incorporates a hyperlink to a wonderfully reliable on-line information storage service (which is why they use Dropbox). If the notification had arrived with none accompanying message, it might probably have been ignored. Nonetheless, the recipient has been primed, so they’re extra more likely to go to the Dropbox web site and attempt to view the doc.

Dropbox file

When the sufferer clicks the hyperlink, they see a blurred doc and a window opens on prime of it requesting authentication utilizing workplace credentials. Right here, nevertheless, seeing just isn’t believing, for each the blurred background and the window with a button are in reality elements of a single picture inserted right into a PDF file.

PDF file uploaded to Dropbox

PDF file uploaded to Dropbox that mimics an authentication request

The sufferer doesn’t even must click on the VIEW DOCUMENT button – the complete floor of the picture is actually one huge button. The hyperlink beneath it leads (by way of an intermediate web site with a redirect) to a script that launches a kind to enter login credentials – simply what the attackers need.

All firm workers must be conscious that work passwords ought to solely be entered on websites that clearly belong to their firm. Neither Dropbox nor exterior auditors ought to know your work password and subsequently can’t confirm its authenticity.

Easy methods to keep protected

As attackers give you ever extra refined schemes to steal company credentials, we suggest implementing options that present data safety on a number of ranges. First, use company mail server safety, and second, set up a safety answer with dependable anti-phishing applied sciences on all internet-facing work units.





Supply hyperlink

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles