by Mendy Newman
Posted on October 25, 2022
Want to interview Mendy?Contact
In recent months, two new phishing approaches have been making waves and raising concerns. Both were publicized by mr. d0x, a penetration tester and security researcher who frequently publishes his findings to raise awareness about emerging threats. The first is a way to use Chromium’s application mode to build fake desktop apps for phishing. The other is technique for creating fake login forms on websites (or more accurately, forms that appear to be legitimate login forms on websites).
The first phishing technique leverages the – app command line flag, which is supported by Chromium-based browsers, to launch a site in a separate browser window in a manner that appears to be an app. For instance, it does not display an address bar and instead of Chrome or Edge favicons appearing in the task bar, the favicon of the website is displayed.
In order to have the “correct” favicon – i.e., the one for the spoofed app – appear in the task bar, the website address (which is hidden) must be associated with that favicon. This can be accomplished by copying the favicon of the site being spoofed and using it for the phishing website.
The spoofed phishing app can be delivered via an email with a shortcut link to the URL, including the “—app” parameter. Unfortunately, it is not hard to imagine a user receiving an email or text notification that they need to login to their Teams, Microsoft or Google account, clicking on the link, and logging in on an expertly spoofed app, as described above.
The second phishing technique reported by mr. d0x was actually publicized a number of months ago but has been making headlines again due to its use in a recent phishing attack that steals Steam Gaming accounts. This phishing campaign targets high-value professional gamer accounts, with the goal of selling account access.
The basic technique, as described by mr. d0x, creates a simulated browser window within an existing browser window that appears to be a sign-in window pop-up. What makes the technique especially effective – that is to say, nefarious – is that a genuine URL can be shown in the pop-up address bar, since it is not actually a window.
The recent attacks that leveraged this technique were delivered using a direct message on Steam. Selected high-value users were invited to join tournament teams, with a link to sign up on the site of a fake organization that claimed to host esports competitions. Visitors were asked to sign up to play, and when they clicked, a form that requested Steam credentials opened in a (seeming) pop-up.
The “overlay” of course, was in fact a fake window within the spoofed organization’s page that they were already on. The sign-in pop-up was designed to be highlight realistic. For instance, it displayed a genuine-looking Steam URL in the address bar and include a graphic of the SSL lock icon.
When a user entered credentials, they were prompted to enter the 2FA code by an additional form. Because the phishing site simultaneously passed login info to the actual Steam site, incorrect authentication information triggered an additional expertly spoofed form in real time to prompt the user to re-enter the 2FA code. And once they correctly authenticated, users were sent to a legitimate gaming site, to keep them from realizing that they have been had.
New phishing techniques are constantly being created to trick even very alert users, and old techniques are being updated. But the sad truth – for users, that is – is that phishing works, even when the techniques are nowhere near as sophisticated as those described above. Users are simply inundated with emails, text messages, IMs and pop-ups, and more often than not, if the graphics look right and the “required” action resembles any of the many usual sign-ins or clicks required of users every day, some people will fall for the phish.
To protect users from phishing, passive protection is the only reliable option. Ericom’s ZTEdge Web Isolation leverages remote browser isolation (RBI) to prevent users from falling for fake sign-in appeals on phishing sites, regardless of how convincing they may be. ZTEdge Web Isolation opens web sites with poor reputational ratings in read-only mode to prevent users from entering credentials of clicking on links – regardless of how convincingly the sites spoof normal sign-in procedures.
While the threat posed by phishing is troublesome for private users like gamers, it is exponentially more dangerous when those users use their personal, unmanaged devices to connect into enterprise networks. Once cybercriminals have access to a user device, they can monitor keystrokes to gather credentials for enterprise systems and web apps, as well as SaaS and cloud apps, to breach data, deliver ransomware and cause general havoc.
ZTEdge Web Application Isolation (WAI) protects organizations’ web-facing apps by inverting RBI to cloak application surfaces from threat actors’ view. It prevents them from probing for vulnerabilities that they can exploit. Because remote users can access web and cloud apps only via an isolated environment in the Ericom Global Cloud, enterprise apps are protected even if user credentials are stolen. WAI is a cloud-based solution that does not require any software to be installed on user devices.
Discover how Ericom ZTEdge Web Isolation and WAI can defend against even the most sophisticated phishing techniques. Contact us for a demo today.
Actively defending your users' browsers, and not relying on them to recognize threats, using remote browser isolation is critical to protecting your network.
Faced with increasing numbers of attacks, cyberinsurers are writing more exclusions into policies and requiring more effective cyberdefenses.
If proper security for EMR systems are not put in place, there is increase risk of cyberattack, personal data exposure, and costly HIPAA violations.