Figure 1: Email BodyFigure 1 is the email body generated by the Adobe file-sharing service use. Cofense has observed Adobe as a popular file-sharing service threat actors use to deliver their lure. The attack could be sent out using just about any similar service. By naming the file “TAX PAYMENT REFUND,” the recipient is more likely to interact with the link in hopes of getting money back instead of writing a check. Clicking the “Review and sign” button directs the recipient to an Adobe file-sharing page which in turn eventually leads to a Microsoft SharePoint site.
Figure 2: SharePoint PageFigure 2 shows the SharePoint page the target is taken to from the shared file on Adobe. We see the shift in the subject went from being about taxes to simply “Payment Details,” it’s common for threat actors to reuse pieces of one campaign for another. Once the user clicks “View Payment Details” they are taken to the final landing page. At this point, the recipient may have realized this was a phish and hit the Reporter button.
Figure 3: Phishing PageThe landing page in Figure 3 is another standard style for a Microsoft-themed phish. There is one unique feature: the blurred-out W-9 form in the background. It’s a small detail, but it still holds the potential to convince a user into believing there is an actual form to view once logged in. Though this specific campaign is not the most detailed or unique, it is still important for the users to be wary of any tax-related emails. Within the coming months, there are bound to be more campaigns such as this one, and it is fair to assume that some will be more complex and trickier than the ones on display here. If your enterprise would like to benefit from the protection of the Cofense Phishing Defense Center (PDC), contact us to learn more.
|Indicators of Compromise||IP|
|hxxps://na4[.]documents[.]adobe[.]com/public/esign?tsid=CBFCIBAA3 AAABLblqZhCP48aUN7RoG-VJgs3s k2MItAA74xTWpSvSX-Fb-D9J0VXGy9NdV_0IHCY7YwUDvjH||22.214.171.124|