Top Email Protections Fail in Latest COVID-19 Phishing Campaign

Top Email Protections Fail in Latest COVID-19 Phishing Campaign
Share It On:

03 April 2020 Kathmandu

An effective spoofing campaign claims to inform users about new COVID-19 cases in their local area, scooting past Proofpoint and Microsoft Office 365 ATPs.

Threats are still steady, if not growing, amid the COVID-19 pandemic. Cybercriminals continue to capitalize on fears surrounding the coronavirus outbreak. The most recent one is the effective bypassing Proofpoint and Microsoft 365 Advanced Threat Protections (ATPs).

In fact, these two tools are popular among users as top email protection. However, attackers found a way to get past the security to lure users into their phishing campaign.

The Cofense Phishing Defense Center (PDC) discovered the new phishing campaign that uses socially engineered emails claiming access to important information on COVID-19 cases in the receiver’s local area.

Phishing Campaign 101

According to the researchers, the emails evade basic security checks and use logic to bypass detection. As a result, the attackers manage to steal user’s Microsoft credentials.

Regardless of enabling the secure email gateways designed for safeguarding users from clicking on malicious links and attachments, it still failed in this new phishing attack.

According to Cofense, these emails don’t include specific names or greetings in the body of the messages. This suggests that they are being sent out to a broad target audience.

While these secure email gateways (SEGs) are designed to safeguard end users from clicking on malicious links and attachments, both failed in a new phishing attack we recently observed,” Cofense researcher Kian Mahdavi wrote in a post.

How This Phishing Campaign Works

To avoid detection by ATPs, the threat actor impersonates the domain splashmath[.]com – which is an online learning game for children. For this, it uses a spoofed IP address located in the United States, 167[.]89[.]87[.]104.

After further investigation, researchers found that the emails that were sent to a number of people didn’t come from the spoofed address. In fact, they came from an IP corresponding with the Lithuanian city of Kaunas.

This made the researchers believe that a single individual was behind the campaign.

“[Because of the proxy], the email slipped past basic security checks, such as DKIM and SPF,” Mahdavi wrote.

According to the research, the attackers are not just impersonating trusted sender’s email. Moreover, they are using keywords in the subject to trick the targeted victim into believing that the information is from a trusted source regarding COVID-19.

For instance, the words “WHO” and “community” in the email address (who[.]int-community[.]spread@ splashmath[.]com) aim to trick the user into believing that the mail is from the World Health Organization (WHO).

Similarly, the subject of the email – “HIGH-RISK: New confirmed cases in your city” – does the job of fooling users into thinking that it is an important and legitimate email.

Malicious Links Evade Detection

Cofense observed some malicious links used in the campaigns which include:

  • hXXps://heinrichgrp[.]com/who/files/af1fd55c21fdb935bd71ead7acc353d7[.]php
  • hXXps://coronasdeflores[.]cl/who
  • hXXps://www[.]frufc[.]net/who/files/61fe6624ec1fcc7cac629546fc9f25c3[.]php
  • hXXps://pharmadrugdirect[.]com/who
  • hXXps://ee-cop[.]co[.]uk/who/files/3b9f575dac9cc432873f6165c9bed507[.]php

Additionally, these links display a high-quality, spoofed Microsoft login page when users click on them. This way, they are highly misleading to users.

Once the users enter their Microsoft credentials on the login page, they get into the hands of the threat actor.

This is not the first time attackers have used the keywords related to the Coronavirus to lure users to click on malicious links. In this phishing attack, users are directed to a Microsoft branded credential phish to steal their credentials.

Read Also: Android Users At High Risk During Coronavirus Outbreak


Share It On:

Recent Posts

Transforming Rural Education in Nepal: Huawei’s Smart Classroom Project

Transforming Rural Education in Nepal: Huawei’s Smart Classroom Project

Share It On:22nd January 2025, Kathmandu In a significant step toward bridging the digital divide, Huawei has completed the Smart

Empowering Nepali Entrepreneurs: eSewa and SDC Launch New Insurance Solutions

Empowering Nepali Entrepreneurs: eSewa and SDC Launch New Insurance Solutions

Share It On:22nd January 2024, Kathmandu eSewa, Nepal’s leading digital payment platform, has announced a strategic partnership with the Swiss

Nepal’s IT Ordinance 2025: A Milestone with Challenges Ahead

Nepal’s IT Ordinance 2025: A Milestone with Challenges Ahead

Share It On:22nd January 2024, Kathmandu Green Light for Nepal’s IT Sector: Government Delivers, But Are We Ready to Execute?”

ICFC Finance 9% Debenture Issue 2088: 7-Year Maturity, Apply Now via ASBA & Mero Share

ICFC Finance 9% Debenture Issue 2088: 7-Year Maturity, Apply Now

Share It On:22nd January 2025, Kathmandu ICFC Finance Limited has opened its new debenture issuance today, January 22, 2025 (Magh

  • by Mina Aryal
  • January 22, 2025
Nepal SBI Bank Prioritizes Cybersecurity With Leadership Training

Nepal SBI Bank Prioritizes Cybersecurity With Leadership Training

Share It On:22nd January 2025, Kathmandu Cybersecurity Awareness session for the Board of Directors and Senior Management of Nepal SBI

Nepal Finance Reports Q2 Profit Surge: Expanded Loan Portfolio & Improved Financial Performance

Nepal Finance Reports Q2 Profit Surge: Expanded Loan Portfolio &

Share It On:22nd January 2025, Kathmandu Nepal Finance Limited has seen a dramatic rise in its profits and reserves, driven

  • by Mina Aryal
  • January 22, 2025