Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Advanced Phishing Attacks

Advanced Phishing Attacks

Mahesh Bheema

June 02, 2022
Tweet

Other Decks in Education

Transcript

  1. About Me: Mahesh Bheema @0xmahesh • Lead Security Testing Engineer

    • 9+ Years of experience in Infosec domain • Speaker & Trainer at local infosec communities • Chapter Leader of Null Hyderabad - Open Security Community
  2. Agenda • Phishing and its types • Phishing Campaigns with

    gophish • Demo - gophish • Issues with email delivery • MFA Phishing with Evilginx • How Evilginx works • Demo – Evilginx. • Identifying Phishing mails • Protection Against Phishing • Questions Disclaimer: This session is purely for educational purpose. Speaker/null assume no liability and is not responsible for any misuse of this knowledge.
  3. What is Phishing • Phishing attacks are the practice of

    sending fraudulent communications that appear to come from a reputable source, these communications are designed to lure a victim. • The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine
  4. Common Types of Phishing • Email Phishing • Vishing/Smishing •

    Spear Phishing • Whaling • Angler Phishing
  5. Gophish – Phishing Toolkit • Phishing campaigns help adversaries to

    perform phishing against large group of people at once. • This also helps them to track whether emails are sent, opened and clicked, etc.. • Help to capture passwords. • Helps with statistics of the campaign, also generates excel reports.
  6. Overcoming Common Issues with Email Delivery Most of the newly

    created domains are flagged as spam. So, plan accordingly. Create domains and email prior at least 1-2 months prior to attack, this will help bypass few spam filters. Authenticate your email with SPF, DKIM, and DMARC Warm up your domain and scale up email send volume gradually Avoid Spammy words in subject or email
  7. Evilginx • evilginx is a man-in-the-middle attack framework used for

    phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. It doesn't matter if 2FA is using SMS codes, mobile authenticator app or recovery keys. • With Evilginx there is no need to create your own HTML templates. Instead of serving templates of sign-in pages lookalikes, Evilginx becomes a relay between the real website and the phished user. • Phished user interacts with the real website, while Evilginx captures all the data being transmitted between the two parties.
  8. Logic behind MFA Phishing • Evilginx utilizes the concept of

    reverse proxying to efficiently relay traffic back and forth between phished users (e.g., targeted employees) and real websites (e.g., authentication providers). • This positioning allows Evilginx to act as a man-in-the-middle and capture raw credential information without the attacker having to clone fake pages or do heavy lifting. Besides maintaining the server itself, most of the configuration necessary is in the Evilginx YAML files that tell it how to act on a per-domain basis.
  9. Recognizing a Phishing attempt • User education § Unusual Sender

    § Sense of Urgency/Threatening § Typos, improper grammar § Too Good To Be True § Hyperlinks/Attachments § Lookalike domain names (ĸ is not really k) • Spam Filters
  10. Protect against phishing attacks • User education • Spam Filters

    • MFA/Hardware keys • U2F (Universal 2 Factor) devices U2F protocol is designed to take the website's domain as one of the key components in negotiating the handshake. • Microsoft Conditional Access App Control: It performs additional checks that blocks evilginx such as: IP address, Domain Join Membership, etc.
  11. References/Credits • https://breakdev.org/evilginx-2-next- generation-of-phishing-2fa-tokens/ • https://docs.getgophish.com/user-guide/ • https://www.itgovernance.eu/blog/en/the- 5-most-common-types-of-phishing-attack •

    https://thecloudtechnologist.com/2019/04 /29/defending-against-evilginx2-in-office- 365/ • https://www.mailmodo.com/guides/increa se-email-deliverability • Images are taken from google, credit goes to the original creators.