|
"contents": "Subscribe \u00d7 EXPEL BLOG Attack trend alert: AWS-themed credential phishing technique Security operations \u00b7 4 MIN READ \u00b7 SIMON WONG AND EMILY HUDSON \u00b7 FEB 1, 2022 \u00b7 TAGS: Cloud security / MDR / Tech tools The Expel Phishing team spotted something \u2026fishy\u2026 recently. We came across a less common but well crafted Amazon Web Services (AWS)-themed phishing email that targets AWS login credentials. These emails have been reported in the past by security practitioners outside of Expel, but this is the first time our security operations center (SOC) encountered this technique. Now that we\u2019ve seen this tactic in the wild, we wanted to share what we learned about this attack and how our SOC analysts triage malicious emails here at Expel. What happened Expel\u2019s Phishing team reviews hundreds of emails a day and thousands of emails on a weekly basis; the vast majority of malicious emails we encounter are credential phishing attacks that are Microsoft themed. Why are they often Microsoft themed? We think it\u2019s because Microsoft and Google have dominant market share and both tech giants have highly reputable brands. Their cloud platforms and offerings are reliable cloud infrastructures, which cover most businesses\u2019 needs \u2013 like email, communications, and productivity applications. So this attack was interesting to us. Similar to Microsoft and Google, AWS is a popular cloud platform. If attackers were to obtain AWS credentials to an organization\u2019s cloud infrastructure, this can pose an immediate risk to their environment. On January 26, 2022, our customer\u2019s user submitted a suspicious email for review. We picked it up and immediately turned the email into an investigation based on some highly suspicious indicators (we\u2019ll dive into those below) that were surfaced to our analyst by one of our bots, Ruxie\u2122 . Based on these leads, we decided to dig into the submitted email for a closer look. How we triaged The way we triage emails here at Expel can be different from other managed security service providers. We use our platform, the Expel Workbench\u2122 , to ingest user submitted emails. From there, based on detections and rules created by our team, the Expel Workbench gives context for why the email is suspicious. This context provides decision support for our analysts as they review the email. That way the analyst can focus on applying what we call OSCAR (orient, strategize, collect evidence, analyze, and report), and perform analysis with decision support from our bots. We walked you through how Expel analysts use OSCAR in a previous post here . Here\u2019s what we can capture from our initial lead by applying OSCAR. By orienting , we notice that Ruxie\u2122 surfaced a suspicious link that isn\u2019t related to Amazon. And within the screenshot we noticed some poor grammar \u2013 there\u2019s no space in between \u201caccount\u201d and \u201crequires.\u201d We\u2019ve also noticed these bad actors are always cordial by making use of words like \u201ckindly.\u201d The image below is a screenshot of the suspicious email. Suspicious email submitted to Expel Phishing Let\u2019s strategize next! There are two common phishing tactics we see when it comes to phishing. One is suspicious hyperlinks and the other is file attachments. In this case, Ruxie informed us that there\u2019s no attachment. But there\u2019s a suspicious hyperlink that needs to be reviewed.The image below shows the suspicious link surfaced by Ruxie in the Expel Workbench. Expel Workbench initial alert Next step: let\u2019s collect evidence. Wow, these bots are really helping us out here! Without the need to download the email file and open it in an email client for analysis, our bots do all the heavy lifting for us. Here Ruxie\u2122 surfaces the URL, recognizes that there is a partial base64 string which looks to be an email address, and sanitizes that email address. Awesome! Ruxie actions in the Expel Workbench In a previous post , we mentioned how Expel managed phishing uses VMRay to analyze phishing emails. But not everyone has access to an advanced sandbox. Can you still analyze malicious emails? Absolutely! We\u2019ll show you how to do this by using free tools like a simple web browser sandbox and the built in developer tools, which is one of our favorite methods of analysis. We recommend using Browserling , as this provides you with a safe environment to analyze suspicious hyperlinks. We\u2019ll be using Mozilla and it\u2019s developer tools as the web browser in this example. Follow these steps to access the developer tools: Navigate to the malicious domain. Let the landing page load. Note that this page is convincing if you\u2019re not careful, since the threat actor has cloned the page. Fake AWS sign-in page Enter the faulty credentials: [email protected] Navigate to the browser\u2019s developer tools. Mozilla developer tools navigation Here is a side-by-side comparison of the two pages. As you can see, they\u2019ve cloned the AWS login page. If a user isn\u2019t careful in reviewing, they\u2019ll fall victim to this attack. Left: Real AWS login page. Right: Fake AWS login page There are few important HTTP methods, like \u201cGET\u201d request, you can use when you\u2019re attempting to get data from a web server. But what about when you\u2019re investigating where credentials are being stored? You\u2019ll want to follow the \u201cPOST\u201d request traffic. This HTTP method is used to send data to the web server and most commonly used for HTTP authentication with PHP. After entering phony credentials we see the \u201cPOST\u201d request is storing the credentials to the same domain. Now we can scope using this indicator as evidence to identify potential account compromises. Mozilla developer tool In addition to our awesome bots (can you tell we love our bots here at Expel?), we also have automated workflows that are built into the Expel Workbench\u2122 that can help our analysts be more efficient by reducing cognitive loading for triaging emails. By running our domain gather query we observed no evidence of traffic to the malicious credential harvesting domain, which suggests no signs of compromise! Whew! Last but not least, we can now record that there was no evidence of compromise in our findings as a part of the investigation. Ruxie analysis that displays any POST requests made to the fake AWS webpage across the customer\u2019s environment Although tech is great and can help us be more efficient at running down investigations related to credential harvesting, it\u2019s not always necessary and we can still achieve the same goal manually. The technique we just walked you through in this post can be applied to triaging any suspicious credential harvesting email. How you can keep your org safe AWS users are just as vulnerable to credential phishing attacks as Microsoft users. And if an AWS user falls victim to phishing emails and social engineering techniques, putting their credentials in the hands of an attacker, there\u2019s a chance you\u2019ll be dealing with a cloud breach. Here are a few ways you can remediate if your AWS account was compromised: Reset Root/IAM user credentials. Disable, delete, or rotate access keys. Audit permissions and user activity through the use of CloudTrail. Enable AWS multi-factor authentication on user accounts. We hope you found this post helpful! Have questions or want to learn more about how the Expel Phishing team works? Let\u2019s chat (yes \u2013 with a real human)." |