BD Platform
Security Operations, Accelerated.
Phishing – you’ve heard of it, know of it, and hopefully haven’t fallen victim to one of those nasty links yourself. Social Engineering is an attack vector that will never truly go away and continues to have a large sprawl as technology evolves. This continues to be ever true this year as we have seen different advancements in software realms like AI and Automation. For us here at Binary Defense, we have observed a specific tactic picking up speed – the use of automations to speed up Phishing attacks and lead to a compromise just moments away from a click.
A Phishing Toolkit is a collection of pre-packaged software and resources that malicious actors will use to quickly configure attack paths to obtain compromised user credentials. These typically include masquerading web pages designed to look like a legitimate service, e-mail templates that are providing some urgency or free item, and most recently automations to help scale operations outwards. The most important thing for these kits is they need to be efficient and capable of processing web requests to extract important information. Comparative to attacks of old where stolen credentials would be used days later – these automations can hijack a legitimate session live to compromise a user near-instantaneously.
For these types of kits, the core of the requirements is the ability to consistently utilize APIs and captures authentication information from the session itself. There’s a few different packages that have been utilized for this in the past, such as python-requests, powershell, Resty, go HTTP client – but within the industry there has significantly been an upsurgence in use of the Axios library. Axios differs from a lot of the other options available due to it’s ability to intercept data responses that typically are not as quick or complete as other clients. With this ability available to cybercriminals, there has been an insurgence of attacks focused on taking the abused credentials from a phishing URL to bypass or hijack MFA & conditional access policies. This means that even thought your organization might have protections in place – attackers are already finding ways to circumvent them.
Unfortunately, these attacks do occur in our ecosystem as well. Binary Defense was alerted last week to an incident where we observed a risk event for an Entra ID user authenticating into their environment. What we observed was a bit of a strange authenticate chain for this user – we saw an established session within the environment as normal performing their daily duties. Suddenly, a few hours in we saw some additional authentications into the environment – with one failure due to no MFA devices being configured. Then, a secondary authentication attempt occurred just one minute later from the same IP – with a new MFA device registered. The authentication still failed due to an established Conditional Access policy; but just moments later a successful login occurred with the same device within an appropriate location.
Within moments the session established from this secondary IP began to attempt to wreak havoc – removing any other MFA devices, resetting passwords, and enumerating the available different applications within the Office tenant. Thankfully MFA is not the only defense against malicious actors – and this organization had established Least Privilege for their accounts properly. The end user did not have access to any administrative groups or applications meaning that the actor did not have much to go on for additional routes. It was at this point that Binary Defense reached out to the customer and appropriate actions were taken to disable the account and reset credentials.
If we break this attack pattern down to the barebones grease, there’s a few items to pay attention to for what happened to this user:
From the lens of a Detection Engineer – we need to review what’s available to us and say “where can I nail this guy”. It’s kind of like being a web detective if you think about it enough. Our goal as Defenders is to prevent malicious behavior as high in the chain as possible so we can make sure nothing catastrophic occurs.
Stepping back and reviewing this attack, there are some truths we can find within the logs:
So – knowing what we know now about our attack path, a Detection Opportunity arises. Enter a new Detection within our own DE Toolkit – Authentications from Programmatic User Agents. This is a fairly novel detection in most situations, as the only users who would ever login to their own account with a program legitimately are developers trying to create a new internal script or application.
Each of the opportunities below are still relevant to have protections around in your organization in related to automated Phishing Toolkits:
So – all this to say that Phishing is still a novel threat vector within any environment. However, it’s important to understand that cybercriminals are always looking to improve which means we need to as well.
Here at Binary Defense, we’re always keeping an eye out and looking to improve. Looking for new Detection Techniques within any scenario can lead to real results that help us protect against the next attempt.