Press ESC to close

Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft | Huntress

CategoryDetails
Threat ActorsUnknown; potentially a new Phishing-as-a-Service framework.
Campaign OverviewMass phishing campaign combining HTML smuggling, Iframe injection, and session theft via a transparent proxy.
Target Regions/VictimsLikely targeting Outlook users; specific regions not detailed.
MethodologyPhishing emails with HTML file payloads that render an iframe of the Outlook login portal proxied through attacker-controlled infrastructure, enabling credential harvesting and MFA bypass.
Product TargetedMicrosoft Outlook and OWA (Outlook Web Access).
Malware ReferenceHTML smuggling payload file (hash: 18470571777CA2628747C4F39C8DA39CA81D1686820B3927160560455A603E49).
Tools UsedCustom JavaScript within HTML files; potential use of new Phishing-as-a-Service framework (not confirmed).
Vulnerabilities ExploitedMFA bypass using Adversary-in-the-Middle (AitM) techniques via iframe-proxied authentication portals.
TTPsHTML smuggling, iframe injection, Adversary-in-the-Middle attack, session theft, bypassing MFA, stealing web session cookies, using dynamic document.write() calls to inject malicious code.
AttributionUnattributed; Huntress suspects a novel technique or tool.
RecommendationsAvoid opening unexpected HTML files; verify URLs in login portals; escalate suspicious activity to security teams; leverage advanced telemetry for detection; report suspected incidents to Huntress or relevant security entities.
SourceHuntress Blog

Read full article: Read More

Disclaimer: The above summary has been generated by an AI language model.

Source: Huntress Blog

Published on: May 23, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *