Press ESC to close

Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation ‘ONNX’

Category Details
Threat Actors Abanoub Nady (a.k.a. MRxC0DER) and four unidentified individuals.
Campaign Overview Operated 240 phishing websites under the fraudulent “ONNX Store” to sell phishing kits bypassing security.
Target Regions (Victims) Global; targeted Microsoft 365 users and the financial services sector.
Methodology – Phishing-as-a-Service (PaaS).
– Use of QR code-based phishing (quishing).
– Subscription tiers and support for phishing campaigns.
Product Targeted Microsoft 365 accounts; financial data from the financial services sector.
Malware Reference Not explicitly mentioned; phishing kits/tools used for attacks.
Tools Used ONNX phishing kits, Telegram for communications, subscription-based PaaS model.
Vulnerabilities Exploited Social engineering techniques such as phishing and quishing; exploiting trust in branded platforms and QR codes.
TTPs – Selling phishing kits through branded storefronts.
– Leveraging Telegram for customer communications.
– Using QR codes to bypass traditional phishing defenses.
Attribution Microsoft and researchers (Dark Atlas, Mandiant) identified Abanoub Nady as the key operator.
Recommendations – Enhance email and PDF scanning for QR-based phishing attempts.
– Monitor and block malicious domains associated with ONNX.
– Collaborate with other organizations to combat PaaS cybercrime.
Source The Record

Read full article: https://therecord.media/microsoft-seizes-websites-onnx-phishing

The above summary has been generated by an AI language model

Source: The Record

Published on: November 21, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *