Purchase Order Phishing, the Everlasting Phishing Tactic

The PDC team has seen a recent up-tick in legitimate Mimecast services being used as vector for phishing campaigns found in environments protected by Microsoft ATP, Microsoft EOP and Mimecast. 

By Adam Martin, Nathaniel Sagibanda, Kian Buckley Maher and Cofense Phishing Defense Center

Figure 1

The phish leverage the Payment Order,” a common vector for enticing users into initiating the process set out by a malicious actor to attain sensitive credentials (Figure 1).

Figure 2 

In this attack, as illustrated in figures, the body of the email is a reasonable facsimile of an authentic message that even replicates the style of the Mimecast heading and disclaimer. But grammatical, punctuation and spacing anomalies represent red flags. Furthermore, the email itself looks benign, simple and straight to the point, informing the recipient that the required information is behind an external service due to an issue with storage size or formatting (Figure 1). This is a common tactic that allows malicious actors to circumvent mail filters such as Mimecast, Microsoft EOP and Microsoft ATP.  

Figure 3 

Upon inspection of the Download Files button we can see that the service being used to deliver this phish is in fact Mimecast, itself a legitimate service. Combining this with the previously noted circumvention method makes standard detection almost impossible.  

Once access has been gained to the first landing page, there will be an option to download the malicious file at the side of the page. To add authenticity, the credentials of the original sender have been replicated, as shown below in Figure 4. 

As seen in Figure 3, the page presented to the user is a legitimate Mimecast service being used to host the malicious file. This is compounded by the use of a key to gain access to the file by clicking the access-key button or entering a previously provided key (see Figure 3). However, both methods will direct the user to the next stage. 

Figure 5 

Figure 4 

Email Header analysis: Taking a look at the headers on Figure 6it is a different story altogether. IP addresses such as [10.x.x.182 and 10.x.x.36] are used bindependent operating networks. These may be as small as a single computer connected to a home gateway, and are installed in hundreds of millions of devices automatically. 

Figure 6

Figure 7 

However, IP 41.x.x.131 belongs to MimecastSA (according to VirusTotal and Whois), and could be the reason it escaped SEG detection. 

 Figure 8 

Having accessed the malicious link, the user will see the above page displayed (Figure 7) with request for the userMicrosoft email address and password. Unlike other credential phishing pages, the Microsoft background and logo aren’t displayed. The simplicity of the page, combined with a URL lacking indicators of Microsoft or associated domains, is suspect. The third field is the most obvious red flag (Figure 7): A recovery option is made available even though an incorrect password hasn’t been entered. This is done to prompt the victim into providing a phone number.  

Indicators of Compromise

Having inserted test credentials, the information is exported to the phishing campaign URL address. This site is hosted by  Entering information will continually refresh the page regardless of credentials supplied.   23[.]235[.]212[.]50  hXXps://www.docdroid[.]net/OwKxXnZ/purchase-order-00177389-pdf 

 

Network IOC   IP   
hXXp://biz267.inmotionhosting[.]com/~craneo5/pow/po[.]php 

 

 54[.]37[.]79[.]95 
All third-party trademarks referenced by Cofense whether in logo form, name form or product form, or otherwise, remain the property of their respective holders, and use of these trademarks in no way indicates any relationship between Cofense and the holders of the trademarks. Any observations contained in this blog regarding circumvention of end point protections are based on observations at a point in time based on a specific set of system configurations. Subsequent updates or different configurations may be effective at stopping these or similar threats. 
 
The Cofense® and PhishMe® names and logos, as well as any other Cofense product or service names or logos displayed on this blog are registered trademarks or trademarks of Cofense Inc.

 

This post was first first published on Cofense’s website by Cofense. You can view it by clicking here