{"id":8083,"date":"2024-06-26T14:30:35","date_gmt":"2024-06-26T14:30:35","guid":{"rendered":"\/cybersecurity-blog\/?p=8083"},"modified":"2024-06-26T16:36:52","modified_gmt":"2024-06-26T16:36:52","slug":"analysis-of-the-phishing-campaign","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/","title":{"rendered":"Analysis of the Phishing Campaign: <br>Behind the Incident"},"content":{"rendered":"\n<p>In this post we detail our comprehensive investigation into the <a href=\"https:\/\/any.run\/cybersecurity-blog\/phishing-incident-report\/\" rel=\"noreferrer noopener\" target=\"_blank\">phishing campaign<\/a> encountered by our company. Our aim is to help others better understand this ongoing threat and take steps to protect themselves.<\/p>\n\n\n\n<p><strong>Here are some key findings:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We found around 72 phishing domains pretending to be real or fake companies. These domains created believable websites that tricked people into sharing their login details.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The attack was sophisticated, using advanced techniques like direct human interaction to deceive targets.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We analyzed several fake websites and reverse-engineered their web-facing application.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At the end of the post, you will find a list of IOCs that can be used for improving your organization\u2019s security.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Now, let&#8217;s examine the campaign in detail, starting with the attack chain.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Chain&nbsp;<\/h2>\n\n\n\n<p>The attack involved four main stages:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Our client\u2019s account compromise.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Phishing email sent from the breached client to our employee.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Credential theft of our employee using a fake website.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Distribution of phishing emails from the compromised account to its contact list.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>We will explore each step of the attack and the methods used.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incoming Phishing Email from a Client&nbsp;<\/h3>\n\n\n\n<p>On May 27, 2024, while checking the inbox as part of their regular routine, one of our employees came across an email from an existing client. The message appeared as follows:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"958\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-1024x958.jpg\" alt=\"\" class=\"wp-image-8084\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-1024x958.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-300x281.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-768x718.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-370x346.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-270x253.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1-740x692.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/1.jpg 1515w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>In this email, the attacker posing as our client asks our employee to listen to a voice message, whose transcript is unavailable. The link to the recording is provided at the top of the email.&nbsp;<\/p>\n\n\n\n<p><strong>From a phishing perspective, the email is expertly crafted to establish trust through several elements:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The email originates from a domain familiar to the recipient.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The sender&#8217;s full name, phone number, and contact details are provided.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The sender&#8217;s job title aligns with the overall message purpose.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The email is professionally written, with minimal grammatical errors and a non-pushy tone.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information about the audio message, its duration, and the previous day&#8217;s send date imply the urgency to listen to it promptly.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The company values serve as a fitting conclusion to the email.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>The email appears to be carefully designed, but there are two suspicious things to note:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The most obvious one is an external link leading to another website, hidden behind the &#8220;Play voice mail here&#8221; text. While sharing links isn&#8217;t unusual, it&#8217;s still something to be cautious about.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The second thing is harder to spot. The email came from an account that had never contacted our colleague before. However, this isn&#8217;t uncommon when dealing with multiple departments in a client&#8217;s company, who have different responsibilities.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>After considering all the aspects of the email, our colleague made the right decision \u2013 to upload the email to the sandbox and proceed with further actions in an isolated and secure environment.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing Website&nbsp;<\/h2>\n\n\n\n<p>Upon uploading the email to the sandbox and following the link, our colleague landed on a Microsoft login page. At this point, things became less straightforward than they were in the email.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-1024x576.png\" alt=\"\" class=\"wp-image-8085\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/2-1.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><strong>The key factors that made it appear trustworthy for the employee included:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A valid active certificate and no browser warning about visiting a known phishing domain.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Microsoft login page which visually seems legitimate and indistinguishable from the real one.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At that moment, the sandbox did not alert the employee that they were opening a phishing site (This prompted us to rethink our service design and add proper mechanisms for addressing this to the roadmap).&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>On top of that, since the employee was attempting to access the audio message from an external location rather than their own computer, where they were already logged in to Microsoft services, it seemed natural to go through the login process again.&nbsp;<\/p>\n\n\n\n<p><strong>NOTE: Real credentials should never be used in a malware sandbox or any similar setting.&nbsp;&nbsp;&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">URL Inconsistency&nbsp;<\/h3>\n\n\n\n<p>Yet, the first significant mistake was made here \u2013 not enough attention was paid to the URL in the browser&#8217;s address bar. Despite appearing &#8220;legitimate,&#8221; it has no connection to the email sender, Microsoft services, or our company\u2019s infrastructure.&nbsp;<\/p>\n\n\n\n<p>Upon closer examination, if we navigate to the domain&#8217;s main page, we find a WordPress site created using a template:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"581\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-1024x581.png\" alt=\"\" class=\"wp-image-8086\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-1024x581.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1-740x420.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/3-1.png 1270w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>With the help of <a href=\"https:\/\/web.archive.org\/web\/20240000000000*\/www.reytorogroup.com\" target=\"_blank\" rel=\"noreferrer noopener\">WayBack Machine<\/a>, a digital archive of websites, we can see that the website has been updated only once, which should prompt vigilance:\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"117\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-1024x117.png\" alt=\"\" class=\"wp-image-8087\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-1024x117.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-300x34.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-768x88.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-370x42.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-270x31.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4-740x84.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image4-4.png 1533w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Plus, the site&#8217;s blog contains <a href=\"https:\/\/app.any.run\/tasks\/cd7672e8-d5ce-4d98-83f2-457ecf1a04cf\" target=\"_blank\" rel=\"noreferrer noopener\">articles<\/a> about code debugging techniques that are unrelated to the site&#8217;s primary theme \u2013 clothing production:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-1024x576.png\" alt=\"\" class=\"wp-image-8088\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/5-1.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It&#8217;s worth noting that the site&#8217;s color scheme resembles the client&#8217;s web page design.&nbsp;<\/p>\n\n\n\n<p>Interestingly, a search on Google brought up a <a href=\"https:\/\/wpml.org\/forums\/topic\/language-switcher-editor-issue\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">post<\/a> by the website creator:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"396\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/6-2.png\" alt=\"\" class=\"wp-image-8089\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/6-2.png 715w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/6-2-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/6-2-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/6-2-270x150.png 270w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/figure><\/div>\n\n\n<p>Although we cannot definitively say at this moment whether this website was purposefully created for phishing or compromised, the likelihood of the former is high.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2FA Completion&nbsp;<\/h3>\n\n\n\n<p>From here, everything proceeded as in a typical service authentication process. The employee entered their login and password, making the second mistake \u2013 completing the two-factor authentication by entering the secret code from the authenticator app:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"984\" height=\"634\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1.png\" alt=\"\" class=\"wp-image-8132\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1.png 984w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1-300x193.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1-768x495.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1-370x238.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1-270x174.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/enter1-740x477.png 740w\" sizes=\"(max-width: 984px) 100vw, 984px\" \/><\/figure><\/div>\n\n\n<p><strong>Here, it&#8217;s essential to note that two-factor authentication did not protect against this proxy-style phishing attack.<\/strong> All entered data was sent to the attacker&#8217;s server, where the actual authentication took place, rather than in the secure sandbox environment.&nbsp;<\/p>\n\n\n\n<p>After completing the authentication, the employee was redirected to the Outlook website with a message stating &#8220;something went wrong.&#8221; Thinking that something indeed went wrong (remember, the audio transcript was unavailable \u2013 confirming that something was actually broken), the employee decided to leave it be.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-1024x577.png\" alt=\"\" class=\"wp-image-8091\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/8-2.png 1370w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>The employee emailed the client, stating that they were unable to listen to the audio and requested that the voice message be resent in text form.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Outgoing Phishing Emails&nbsp;<\/h2>\n\n\n\n<p>On June 18, 2024, emails were sent from the compromised employee\u2019s account to both staff members and clients on their contact list:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"788\" height=\"551\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9.jpg\" alt=\"\" class=\"wp-image-8092\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9.jpg 788w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9-300x210.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9-768x537.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9-370x259.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9-270x189.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/9-740x517.jpg 740w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/figure><\/div>\n\n\n<p>As shown in the screenshot above, the outgoing email\u2019s quality is significantly inferior to the initial one.&nbsp;<\/p>\n\n\n\n<p><strong>Several details stand out, pointing to the phishing nature of the email:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Numerous spelling, grammar, and logical errors, such as the name &#8220;Randy&#8221; being written in lowercase, the missing verb &#8220;is,&#8221; etc.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The email is not addressed to a specific recipient and was identical for each receiver.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The signature in the email does not match the name of the audio message sender.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The company name Delaware does not correspond to the company mentioned in the signature.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sloppy formatting and inconsistent fonts.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The link provided in the email leads to the Dropbox file-sharing service, which also should raise suspicion.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Note-Taking Dropbox Paper App&nbsp;&nbsp;<\/h3>\n\n\n\n<p>As is often the case, publicly accessible file and note-sharing services are frequently exploited for criminal purposes by malicious actors.&nbsp;<\/p>\n\n\n\n<p>In our example, the attacker created a <a href=\"https:\/\/app.any.run\/tasks\/f60f2323-db00-4f5f-90bd-d0f172483452\/\" target=\"_blank\" rel=\"noreferrer noopener\">note<\/a> claiming that the user who opened the link allegedly had a voice message that they needed to listen to by following the link:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"488\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-1024x488.png\" alt=\"\" class=\"wp-image-8093\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-1024x488.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-300x143.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-768x366.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-370x176.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-270x129.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1-740x353.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/10-1.png 1255w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>As seen in the screenshots above, the note was created separately from the sent emails, as the sender&#8217;s name and company name differ from those mentioned in the email.&nbsp;<\/p>\n\n\n\n<p>Double-clicking the note reveals information about the authors \u2013 Rick and Christina, whom we have not encountered before.&nbsp;<\/p>\n\n\n\n<p>Plus, Dropbox has a feature that, if the user is logged in, allows seeing all previous document viewers:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"518\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-1024x518.png\" alt=\"\" class=\"wp-image-8120\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-1024x518.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-300x152.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-768x389.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-370x187.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-270x137.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1-740x374.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/11-1-1.png 1316w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Upon clicking the link provided in the note, the user is directed to a phishing site with a Microsoft login page that strongly resembles the one seen previously, except for the domain name:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-1024x477.png\" alt=\"\" class=\"wp-image-8095\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-1024x477.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-300x140.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-768x358.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-370x172.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-270x126.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1-740x345.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/12-1.png 1355w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>From here, everything proceeds as it did with the first email \u2013 the user is asked to enter their credentials, which are then sent to the attacker&#8217;s server, where the actual authentication takes place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Technical Analysis&nbsp;<\/h2>\n\n\n\n<p>In this section, we will focus on analyzing the phishing site used by the attacker.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">URL Analysis&nbsp;<\/h3>\n\n\n\n<p>Let&#8217;s start by analyzing the URL that led our colleague to the phishing page. It appeared as follows:&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/www[.]reytorogroup[.]com\/r\/?<strong>&lt;BASE64&gt;<\/strong><span style=\"text-decoration: underline;\">N0123N<\/span><em>%5bEMail%5d<\/em>&nbsp;<\/p>\n\n\n\n<p>The parameterized part of the URL request consists of three parts:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>&lt;Base64&gt;<\/strong> &#8211; Encoded parameters;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><span style=\"text-decoration: underline;\">N0123N<\/span> \u2013 Separator of encoded parameters and email;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><em>%5bEMail%5d<\/em> &#8211; Victums email address, in case of a targeted attack.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>CyberChef helps us <a href=\"https:\/\/gchq.github.io\/CyberChef\/#recipe=From_Base64('A-Za-z0-9%2B\/%3D',true,false)&amp;input=Y21GdVpERTlZWHBrY1ZKSWJIcFphMGt3VlZFOVBTWnpkajF2TXpZMVh6TmZibTl0Sm5KaGJtUXlQVlZJYjNsaWJGRXlXakE1TkZOQlBUMG1kV2xrUFZWVFJWSXlNREExTWpBeU5GVk9TVkZWUlRBMk1qUXdOVEl3TWpReU1ESTBNakF5TkRBMU1qQXlOREEyTWpRbWNtRnVaRE05VkVkc2NGZEZTVE5WVnpselpGRTlQUT09\" target=\"_blank\" rel=\"noreferrer noopener\">decode<\/a> Base64:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"306\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-1024x306.png\" alt=\"\" class=\"wp-image-8096\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-1024x306.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-300x90.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-768x230.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-370x111.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-270x81.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13-740x221.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/13.png 1431w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Decoding the Base64 part of the URI reveals several parameters:&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-106\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"6\"\n           data-wpID=\"106\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:21.097046413502%;                    padding:10px;\n                    \"\n                    >\n                                        Parameter\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:27.637130801688%;                    padding:10px;\n                    \"\n                    >\n                                        Value\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:51.26582278481%;                    padding:10px;\n                    \"\n                    >\n                                        Description\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        rand1\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        azdqRHlzYkI0UQ= (decoded: k7jDysbB4Q)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        random value (purpose unclear)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        sv\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        o365_3_nom\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        design style (see below)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        rand2\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        UHoyblQ2Z094SA== (decoded: Pz2nT6gOxH)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        random value (purpose unclear)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        uid\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        USER20052024UNIQUE0624052024202420240520240624\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        attack identifier (see below)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        rand3\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TGlpWEI3UW9sdQ== (decoded: LiiXB7Qolu)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        random value (purpose unclear)\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-106'>\ntable#wpdtSimpleTable-106{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-106 td, table.wpdtSimpleTable106 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>UID <\/strong>is a composite identifier that is generated during the link creation stage and used for identifying stolen data via web socket. The structure of the parameter is as follows:&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-107\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"12\"\n           data-rows=\"2\"\n           data-wpID=\"107\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Record\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Date\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Year\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"D1\"\n                    data-col-index=\"3\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Index\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"E1\"\n                    data-col-index=\"4\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Time\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"F1\"\n                    data-col-index=\"5\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Date\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"G1\"\n                    data-col-index=\"6\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Sec\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"H1\"\n                    data-col-index=\"7\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Year\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"I1\"\n                    data-col-index=\"8\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Year\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"J1\"\n                    data-col-index=\"9\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Date\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"K1\"\n                    data-col-index=\"10\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Time\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"L1\"\n                    data-col-index=\"11\"\n                    data-row-index=\"0\"\n                    style=\" width:8.3333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Sec\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        USER\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2005\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2024\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"D2\"\n                    data-col-index=\"3\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        UNIQUE\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"E2\"\n                    data-col-index=\"4\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0624\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"F2\"\n                    data-col-index=\"5\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0520\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"G2\"\n                    data-col-index=\"6\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        24\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"H2\"\n                    data-col-index=\"7\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2024\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"I2\"\n                    data-col-index=\"8\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2024\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"J2\"\n                    data-col-index=\"9\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0520\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"K2\"\n                    data-col-index=\"10\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2406\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"L2\"\n                    data-col-index=\"11\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        24\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-107'>\ntable#wpdtSimpleTable-107{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-107 td, table.wpdtSimpleTable107 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>SV<\/strong> is a composite parameter that determines the design style of the phishing page. The right-hand side of the parameter takes one of the values listed in the table below:&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-108\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"5\"\n           data-wpID=\"108\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Value\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Description\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Example\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        nom\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        imitation of Microsoft account login form without styling\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"https:\/\/app.any.run\/tasks\/1e5c0118-1cf6-42f3-bd39-3d3531e2f16b\/\" target=\"_blank\" style=\"color: #009cff; text-decoration: underline;\">https:\/\/app.any.run\/tasks\/1e5c0118-1cf6-42f3-bd39-3d3531e2f16b\/<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        one\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        imitation of Microsoft OneDrive account login form\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"https:\/\/app.any.run\/tasks\/9ef7361c-7a78-4018-8688-e6f64ec20d63\/\" target=\"_blank\" style=\"color: #009cff; text-decoration: underline;\">https:\/\/app.any.run\/tasks\/9ef7361c-7a78-4018-8688-e6f64ec20d63\/<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        sp\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        imitation of SharePoint login form\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"https:\/\/app.any.run\/tasks\/9b67a67e-3b1c-422e-aed3-0dbb7b42a4f3\/\" target=\"_blank\" style=\"color: #009cff; text-decoration: underline;\">https:\/\/app.any.run\/tasks\/9b67a67e-3b1c-422e-aed3-0dbb7b42a4f3\/<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        general\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        outdated email login form (currently inactive)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"https:\/\/app.any.run\/tasks\/bf26b744-fe4e-4c0e-b193-6657e43a6cf5\/\" target=\"_blank\" style=\"color: #009cff; text-decoration: underline;\">https:\/\/app.any.run\/tasks\/bf26b744-fe4e-4c0e-b193-6657e43a6cf5<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-108'>\ntable#wpdtSimpleTable-108{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-108 td, table.wpdtSimpleTable108 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>Our investigation revealed that this type of URL address is being used throughout the entire active phishing campaign. For example, in the link sent to our customers:&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/batimnmlp[.]click\/m\/?cmFu&lt;REDACTED&gt;GWGFUSlNkVFJ0ZWc9PQ==N0123N[EMail]&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Page Behavior Analysis&nbsp;<\/h3>\n\n\n\n<p>Unfortunately, we do not have a decrypted version of the traffic for the original page that was used to gain initial access to our colleague&#8217;s account (it is currently inactive).&nbsp;<\/p>\n\n\n\n<p>Yet, since the phishing campaign is still active, we will use a similar fresh link from another <a href=\"https:\/\/app.any.run\/tasks\/4a8e1312-7b45-4ca3-92b6-0cfc9061ff25\" target=\"_blank\" rel=\"noreferrer noopener\">session<\/a> for analysis.&nbsp;<\/p>\n\n\n\n<p><strong>The First Stage&nbsp;<\/strong><\/p>\n\n\n\n<p>The process begins with the identification of the user, for which the web server returns a fingerprint script when the malicious URL is initially loaded:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"468\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-1024x468.png\" alt=\"\" class=\"wp-image-8097\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-1024x468.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-300x137.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-768x351.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-370x169.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-270x123.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14-740x338.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/14.png 1431w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fingerprint JavaScript code<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>The script gathers information about the user&#8217;s environment, including screen properties, window properties, navigator properties, location, console, document attributes, timezone offset, WebGL information, and more.&nbsp;<\/p>\n\n\n\n<p>The script then exfiltrates the gathered information by submitting it via a hidden form using a POST request to the same URL. An example of the submitted data is shown in the screenshot below:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"928\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15.png\" alt=\"\" class=\"wp-image-8098\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15.png 928w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15-300x187.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15-768x478.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15-370x230.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15-270x168.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/15-740x460.png 740w\" sizes=\"(max-width: 928px) 100vw, 928px\" \/><figcaption class=\"wp-element-caption\"><strong>Content of fingerprint POST request<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p><strong>The Second Stage&nbsp;<\/strong><\/p>\n\n\n\n<p>The second stage involves the attacker&#8217;s server returning a new page with heavily obfuscated JavaScript in response to the client&#8217;s POST request:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"456\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-1024x456.png\" alt=\"\" class=\"wp-image-8099\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-1024x456.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-300x134.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-768x342.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-370x165.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-270x120.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16-740x329.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/16.png 1431w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Script returned in response to fingerprint POST request<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>Interestingly, the &#8220;html&#8221; tag of the page contains additional information about the location of the WebSocket for connecting in the &#8220;point&#8221; attribute (base64 decoded: https:\/\/2moniunesson[.]com). A complete list of the WebSocket servers we have collected can be found in Appendix 2.&nbsp;<\/p>\n\n\n\n<p>The page also contains the identifier &#8220;USER09062024UNIQUE0456060914202420240609560414&#8221; (which we analyzed earlier) in the &#8220;sti&#8221; attribute. The &#8220;vic&#8221; attribute contains the victim&#8217;s email address from the URL in the case of a targeted attack.&nbsp;<\/p>\n\n\n\n<p>The first part of the script can be easily deobfuscated in two consecutive steps using the services hxxps:\/\/deobfuscate[.]io and hxxps:\/\/obf-io.deobfuscate[.]io:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-1024x492.png\" alt=\"\" class=\"wp-image-8100\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-1024x492.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-300x144.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-768x369.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-370x178.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-270x130.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17-740x355.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/17.png 1431w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>First deobfuscation run results<\/strong><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"309\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-1024x309.png\" alt=\"\" class=\"wp-image-8101\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-1024x309.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-300x91.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-768x232.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-370x112.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-270x81.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18-740x223.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/18.png 1428w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Second deobfuscation run results<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>As a result, we obtain a script that loads the &#8220;socket.io&#8221; library.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The second part of the script can be &#8220;fed&#8221; to ChatGPT, which will explain that the script &#8220;jsnom.js&#8221; is embedded and executed in the page:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"235\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-1024x235.png\" alt=\"\" class=\"wp-image-8102\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-1024x235.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-300x69.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-768x176.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-370x85.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-270x62.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19-740x170.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/19.png 1349w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>The result of simplifying the script using GPT<\/strong><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Analysis of the main phishing script&nbsp;<\/h3>\n\n\n\n<p>The script &#8220;jsnom.js&#8221; contains the main logic of the phishing page. It is also obfuscated, but after applying the same deobfuscation services and further processing with GPT, we get absolutely clean and ready-to-analyze code:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"441\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-1024x441.png\" alt=\"\" class=\"wp-image-8104\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-1024x441.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-300x129.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-768x331.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-370x159.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-270x116.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20-740x318.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/20.png 1429w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>The main script of the phishing web page before deobfuscation<\/strong><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"472\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-1024x472.png\" alt=\"\" class=\"wp-image-8105\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-1024x472.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-300x138.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-768x354.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-370x170.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-270x124.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21-740x341.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/21.png 1428w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Script after processing, prepared for analysis<\/strong><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Script Logic&nbsp;<\/h3>\n\n\n\n<p>Next, we will analyze the logic of the script that dynamically updates the appearance of the site depending on its state.&nbsp;<\/p>\n\n\n\n<p>First, the script embeds a new style into the &lt;head&gt; block and adds content and forms to the &lt;body&gt; block. The page starts looking similar to the Microsoft authentication service.&nbsp;<\/p>\n\n\n\n<p>Second, after the user enters their email, the script checks its validity using a regular expression. The domain part is checked against a blacklist that includes about 15 addresses. If the domain is found in the blacklist, then after a 1-second delay, an error message is displayed:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"145\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-1024x145.png\" alt=\"\" class=\"wp-image-8106\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-1024x145.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-300x42.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-768x109.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-370x52.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-270x38.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22-740x105.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/22.png 1429w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Checking against the domain blacklist&nbsp;<\/strong>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>If the email passes all checks, then a connection is established with the web socket and the entered information is sent to the server. The user is shown a progress bar for processing the request.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"278\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-1024x278.png\" alt=\"\" class=\"wp-image-8107\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-1024x278.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-300x81.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-768x209.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-370x100.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-270x73.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23-740x201.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/23.png 1112w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Data sent to the web socket after successful email submission<\/figcaption><\/figure><\/div>\n\n\n<p>If the server-side verification is successful, the server responds with a similar JSON, but with the addition of &#8220;socketId&#8221; and the creation of &#8220;phish_groupid&#8221;. The user is then prompted to enter their account password.&nbsp;<\/p>\n\n\n\n<p>The server additionally sends a JSON containing the background image of the web page (backgroundImage) that needs to be set, the name of the authentication stage (phish_state), and the address of the page (endUrl) to which the user needs to be redirected after the completion of the authentication data collection:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"442\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-1024x442.png\" alt=\"\" class=\"wp-image-8108\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-1024x442.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-300x129.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-768x331.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-370x160.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-270x116.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24-740x319.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/24.png 1426w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Page update parameters that need to be applied after entering the email<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>When the user enters their password, it is also sent to the server for remote authentication:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"428\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-1024x428.png\" alt=\"\" class=\"wp-image-8109\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-1024x428.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-300x125.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-768x321.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-370x155.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-270x113.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25-740x309.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/25.png 1431w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Transmission of user password data<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>Communication with the server ends with receiving information via web-socket about the successful interception of the session:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"53\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/26.png\" alt=\"\" class=\"wp-image-8110\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/26.png 590w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/26-300x27.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/26-370x33.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/26-270x24.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/26-585x53.png 585w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><figcaption class=\"wp-element-caption\"><strong>Server command informing the client to redirect to &#8220;endURL&#8221;<\/strong><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Analysis Results&nbsp;<\/h3>\n\n\n\n<p>Analysis of the code revealed that in addition to intercepting the login and password, there is also the possibility of passing two-factor authentication, where the server will ask for a one-time code.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In this case, the client will actually authenticate on the attacker&#8217;s server, rather than on their own host machine. In this situation, two-factor authentication does not prevent the account from being hijacked.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is this an updated \u201cGreatness phishkit\u201d?&nbsp;<\/h2>\n\n\n\n<p>Based on the structure of the WebSocket request and the analyzed scripts, we might assume that the current phishing kit was stored on the <a href=\"https:\/\/app.any.run\/tasks\/0058abd5-be8e-41c8-8a8e-556a3508c6ac\" target=\"_blank\" rel=\"noreferrer noopener\">Greatness infrastructure<\/a> (Cloudflare Public R2.dev Bucket), but in an updated variant.&nbsp;<\/p>\n\n\n\n<p>This is confirmed by the correlation of the page content with the attributes of the &#8220;html&#8221; tag:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"364\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-1024x364.png\" alt=\"\" class=\"wp-image-8111\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-1024x364.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-300x107.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-768x273.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-1536x546.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-370x131.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-270x96.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27-740x263.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image27.png 1554w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Page content in Greatness phishkit<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>It is also indirectly confirmed by the structure of the GET request using the keywords &#8220;USER&#8221; and &#8220;UNIQUE&#8221;:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"506\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-1024x506.png\" alt=\"\" class=\"wp-image-8112\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-1024x506.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-300x148.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-768x380.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-370x183.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-270x133.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28-740x366.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/28.png 1147w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>GET request in in Greatness phishkit<\/strong><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Threat Landscape Expansion and Further Analysis&nbsp;<\/h2>\n\n\n\n<p>During our investigation, we discovered many lures, including Word documents, PDFs, HTML pages, that lead users into a trap.&nbsp;<\/p>\n\n\n\n<p>We have compiled a list of 72 domains (see Appendix 2) that are suspected to be attacker domains, as well as a list of web-socket servers. This list is constantly being updated, indicating that the phishing campaign is still active.&nbsp;<\/p>\n\n\n\n<p>If you need to conduct your own research, you can submit <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#{%22query%22:%22CommandLine:%5C%22%5C%5C?cmFuZDE9%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">a query to TI Lookup<\/a> to search for sessions launched by users in our sandbox:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>CommandLine:\"\\?cmFuZDE9\" <\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"541\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-1024x541.png\" alt=\"\" class=\"wp-image-8113\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-1024x541.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-300x159.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-768x406.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-370x196.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-270x143.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29-740x391.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/29.png 1103w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Ongoing phishing campaign<\/strong><\/figcaption><\/figure><\/div>\n\n\n<p>You can create a broader, hunting-search query that will significantly increase the amount of detected phishing instances using web-sockets.&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>DomainName:\"aadcdn.msftauth.net\"\u202fand\u202fDomainName:\"cdn.socket.io\" <\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"408\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-1024x408.png\" alt=\"\" class=\"wp-image-8114\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-1024x408.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-300x120.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-768x306.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-370x148.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-270x108.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30-740x295.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/30.png 1108w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>To search for WebSocket servers, you can use third-party search services and the following example search string:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>hash:52c1e7a2c36be28c42455fe1572d7d7918c3180cad99a2b82daa2a38a7e7bb23 AND page.domain:(\/(&#091;0-9]{1,2}|one|two|three|four|five|six|seven|eight|nine|ten)&#091;a-z]{3,9}\\-?&#091;a-z]{3,9}\\.com\/) <\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Recommendations on Protecting Against Such Attacks&nbsp;<\/h2>\n\n\n\n<p>Phishing may be an old tactic, but it remains a major threat to end user security. While there are many tips available online for protecting against phishing attacks, we would like to especially highlight these two:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Two-factor authentication is an essential, but insufficient method of protection,<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>It is necessary to check the URL when entering logins and passwords on any websites.<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We encourage you to reflect on our experiences and make better decisions when coming across suspicious content.&nbsp;<\/p>\n\n\n\n<p>As of now, we have a clear understanding of the attack timeline and the campaign behind it. Based on these findings, we will develop and share our next steps to make our security stronger and improve our products for everyone\u2019s benefit.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix 1 &#8211; Lures Used in the Phishing Campaign&nbsp;<\/h2>\n\n\n\n<p>View screenshots of lures in our GitHub repo: <a href=\"https:\/\/github.com\/anyrun\/blog-scripts\/tree\/main\/IOC\/Images\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/github.com\/anyrun\/blog-scripts\/tree\/main\/IOC\/Images<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p>Links to analysis sessions:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d1cd950c-77ba-4935-b0e4-76163b189aeb\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/d1cd950c-77ba-4935-b0e4-76163b189aeb\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9ef7361c-7a78-4018-8688-e6f64ec20d63\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/9ef7361c-7a78-4018-8688-e6f64ec20d63\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/911ea02f-1a9f-445c-ad46-33fa69cd3d63\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/911ea02f-1a9f-445c-ad46-33fa69cd3d63\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/911ea02f-1a9f-445c-ad46-33fa69cd3d63\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/911ea02f-1a9f-445c-ad46-33fa69cd3d63\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d87e80d1-7e9e-44b6-954e-cf74cc496379\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/d87e80d1-7e9e-44b6-954e-cf74cc496379\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/3a60612b-fafe-4752-bd8c-9e676edad16c\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/3a60612b-fafe-4752-bd8c-9e676edad16c\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9d4f8176-ef85-4ab6-9219-924d0cb5999a\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/9d4f8176-ef85-4ab6-9219-924d0cb5999a\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/7d99d43e-721f-4ba1-8613-8ad84d130940\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/7d99d43e-721f-4ba1-8613-8ad84d130940\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ea33f254-64b4-4633-814d-34835122e20c\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/ea33f254-64b4-4633-814d-34835122e20c\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/63664a41-8647-470c-943f-79c1c9028ce5\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/63664a41-8647-470c-943f-79c1c9028ce5\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/7e24311a-f702-44a7-9604-8941a8f06a09\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/7e24311a-f702-44a7-9604-8941a8f06a09\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/128e0287-f309-49bc-a5a0-5e0f34a8faa3\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/128e0287-f309-49bc-a5a0-5e0f34a8faa3\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ab009452-2dad-44ac-bb3d-8b233319fe46\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/ab009452-2dad-44ac-bb3d-8b233319fe46\/<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/dbfd9297-9804-4093-9270-350591444ddf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/dbfd9297-9804-4093-9270-350591444ddf<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix 2 &#8211; Domains Used in the Phishing Campaign&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing pages domains<\/strong>&nbsp;<\/h3>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-109\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"16\"\n           data-wpID=\"109\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:24.080267558528%;                    padding:10px;\n                    \"\n                    >\n                                        intwrs-rms[.]org\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:29.765886287625%;                    padding:10px;\n                    \"\n                    >\n                                        nqanmsnmk[.]xyz\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:46.153846153846%;                    padding:10px;\n                    \"\n                    >\n                                        www1[.]century21ocean[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        possible[.]network\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        jarramn[.]live\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        936494-session[.]org\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        disquis[.]it\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        technique[.]icu\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        jorimthk[.]xyz\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        emincan[.]sumer[.]me\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        expressing[.]link\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        unlike[.]digital\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        bremac[.]co[.]ke\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        institution[.]top\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        empirical[.]host\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        rectumkal[.]click\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        gsjsmk[.]click\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        subnet[.]sbs\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        nbatmjgf[.]live\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        www[.]reytorogroup[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        drlairribeiro[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        parrtnmal[.]click\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        vanesagalli[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C8\"\n                    data-col-index=\"2\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        packets[.]icu\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        mysexdollscanada[.]ca\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        supercomputer[.]buzz\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C9\"\n                    data-col-index=\"2\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        www1[.]calldrlam[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        baritronics[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        theitalianfactory[.]eu\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C10\"\n                    data-col-index=\"2\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        compiledthoughts[.]couchand[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        ahsnskdfn[.]network\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        iranmehrholding[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C11\"\n                    data-col-index=\"2\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        omajksl[.]click\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A12\"\n                    data-col-index=\"0\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        khoavuaudio[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B12\"\n                    data-col-index=\"1\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        mysuosessui-intp[.]org\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C12\"\n                    data-col-index=\"2\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        pub-6ae0497c224b4ee497b9d8906da627d5[.]r2[.]dev\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A13\"\n                    data-col-index=\"0\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        high822754177219-tech[.]link\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B13\"\n                    data-col-index=\"1\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        europe[.]pipe-bending-systems[.]tv\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C13\"\n                    data-col-index=\"2\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        needbr[.]cloud\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A14\"\n                    data-col-index=\"0\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        ryanstouffer[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B14\"\n                    data-col-index=\"1\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        doger[.]de\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C14\"\n                    data-col-index=\"2\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        kyanaaesthetic[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A15\"\n                    data-col-index=\"0\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        www1[.]haylawoffice[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B15\"\n                    data-col-index=\"1\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        accessing[.]icu\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C15\"\n                    data-col-index=\"2\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        chemvanaprim[.]mopse[.]ac[.]zw\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A16\"\n                    data-col-index=\"0\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        nehhenna[.]click\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B16\"\n                    data-col-index=\"1\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0on-https[.]xyz                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C16\"\n                    data-col-index=\"2\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0net-porting[.]xyz                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-109'>\ntable#wpdtSimpleTable-109{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-109 td, table.wpdtSimpleTable109 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WebSocket C2 domain list<\/strong>&nbsp;<\/h3>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-110\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"8\"\n           data-wpID=\"110\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:33.02752293578%;                    padding:10px;\n                    \"\n                    >\n                                        twomancake[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:35.045871559633%;                    padding:10px;\n                    \"\n                    >\n                                        11cyclesforest[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:31.926605504587%;                    padding:10px;\n                    \"\n                    >\n                                        sevenmanjungle[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        fiveradio-newbam[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        24playerhd[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        onemanforest[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        11beamgools[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        8boomandool[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        threemanshop[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        6treesmangle[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2moniunesson[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        fourmanchurch[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        sixmanteams[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        18tiktok[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        fivemanchool[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        fourthmanservice[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        3dsverify-etsy[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        4dconnect[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        3dsafepays[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        1stmangago[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        oneanalyticpartners[.]com\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        53statestreetboston[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        onedrive-microsoft[.]com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C8\"\n                    data-col-index=\"2\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a09cantronnfit[.]com                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-110'>\ntable#wpdtSimpleTable-110{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-110 td, table.wpdtSimpleTable110 th { white-space: normal !important; }\n<\/style>\n\n","protected":false},"excerpt":{"rendered":"<p>In this post we detail our comprehensive investigation into the phishing campaign encountered by our company. Our aim is to help others better understand this ongoing threat and take steps to protect themselves. Here are some key findings:&nbsp; Now, let&#8217;s examine the campaign in detail, starting with the attack chain.&nbsp; Attack Chain&nbsp; The attack involved [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8073,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34],"class_list":["post-8083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analysis of the Phishing Campaign: Behind the Incident - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"See the results of our investigation into the phishing campaign encountered by our company and get information to defend against it.\u00a0\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Analysis of the Phishing Campaign: Behind the Incident\",\"datePublished\":\"2024-06-26T14:30:35+00:00\",\"dateModified\":\"2024-06-26T16:36:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/\"},\"wordCount\":2982,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/\",\"name\":\"Analysis of the Phishing Campaign: Behind the Incident - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-06-26T14:30:35+00:00\",\"dateModified\":\"2024-06-26T16:36:52+00:00\",\"description\":\"See the results of our investigation into the phishing campaign encountered by our company and get information to defend against it.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analysis of the Phishing Campaign: Behind the Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of the Phishing Campaign: Behind the Incident - ANY.RUN&#039;s Cybersecurity Blog","description":"See the results of our investigation into the phishing campaign encountered by our company and get information to defend against it.\u00a0","robots":{"index":"noindex","follow":"nofollow"},"twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Analysis of the Phishing Campaign: Behind the Incident","datePublished":"2024-06-26T14:30:35+00:00","dateModified":"2024-06-26T16:36:52+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/"},"wordCount":2982,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/","url":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/","name":"Analysis of the Phishing Campaign: Behind the Incident - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-06-26T14:30:35+00:00","dateModified":"2024-06-26T16:36:52+00:00","description":"See the results of our investigation into the phishing campaign encountered by our company and get information to defend against it.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/analysis-of-the-phishing-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Analysis of the Phishing Campaign: Behind the Incident"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8083"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=8083"}],"version-history":[{"count":13,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8083\/revisions"}],"predecessor-version":[{"id":8141,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8083\/revisions\/8141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8073"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=8083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=8083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=8083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}