As we’ve blogged about before, cybercriminals are increasingly leveraging legitimate commercial infrastructure sites to avoid detection and host the growing number of phishing attacks they launch. Reports indicate that these types of attacks are on the rise and manipulating mainstream trusted brands is becoming a favorite tactic of online criminals. The reason this ploy is becoming more prevalent is that it is difficult to detect and can potentially evade existing URL inspection and domain reputation analysis methods.
In a perfect example of this type of fraud, SlashNext discovered a new outbreak where attackers were found to be luring users to Adobe’s open redirect services (hosted at t-info[.]mail[.]adobe.com) through emails as a mean to redirect to various malicious sites. When a potential victim clicked on the link, it immediately began executing a number of redirects that would send the user to one of several different malicious webpages. The first one we discovered was the fake Microsoft Office 365 login page below.
This is a clear attempt to bypass email gateway defenses and their domain reputation engines. Because the initial link is pointing a reputable site, email gateways will consider the page to be a benign site and continue to allow users to visit it.
We’ve highlighted the delays Microsoft Office 365 Advanced Threat Protection (ATP) can experience when creating phishing attack signatures in a previous blog.
As our SEERTM (Session Emulation and Environment Reconnaissance) threat detection technology continued to use virtual browsers in its purpose-built cloud to dynamically inspect this redirect URL behavior in real-time, it found that the redirects had quickly changed and different malicious credential stealing pages were being served. The next page found was the fake login page below for managed cloud computing company Rackspace.
As we continuously re-checked the Adobe URL, the redirects changed to different credential stealing counterfeit pages. Each time the new pages are detected they are added to our list of active threats.
Since the initial URL led to a legitimate (whitelisted) infrastructure and the ultimate redirected destination URLs were not flagged as dangerous demonstrates how this threat is able to bypasses most security stacks. To defend against it organizations need to employ blacklisting strategies that can continue analyzing through multiple redirects and detecting threats to the final URLs.
Our Real-Time Phishing Threat Intelligence and Targeted Phishing Defense solutions can see beyond the legitimate website to identify what might lie in wait. Start a free 15-day trial of Real-Time Phishing Threat Intelligence or contact us for a demo of our Targeted Phishing Defense to see how you can protect your organization.
 Full Adobe redirect Url embedded within Phishing Email: hxxp:// t-info[.]mail[.]adobe.com/r/?id=hc43f43t4a,afd67070,affc7349&p1=t.mid.accor-mail.com/r/?
ex4 Redirected URL leading to fake Microsoft Office 365 login page: hxxps:// weparkyouflyairportparking [.] com/assets-frontend/fonts/.helps/.slide/cmd-login=b6b174a32b31e428caa4fa2e364d589d/?
*** This is a Security Bloggers Network syndicated blog from SlashNext authored by Lisa O’Reilly. Read the original post at: https://www.slashnext.com/threat-discovery-attackers-are-abusing-adobe-open-redirect-service-to-serve-phishing/