BEC Involving Family Members 2024-12-24

December has continued to see targeted spearphish involving compromised mailboxes across Texas and Kentucky, as well as a massive surge in USPS phishing around the holidays. Here are some examples and highlights.

dchbxcsq[.]courtcloudservices[.]com/Tv0Kj/
d1strictresources[.]store/d98he/f93y
resedaclinicaestetica[.]com[.]br/oned/index[.]html
summary-netfilx[.]renew-mysubscription[.]billing-center[.]netfilx[.]com[.]tamiresribas[.]com[.]br
usps[.]com-trackxgb[.]top/us
usps[.]com-parcelplxh[.]vip/i/
usps[.]com-trackcexk[.]top/
usps[.]com-postaasxz[.]top/us


Family Business Email Compromise

On Dec 10th, a staff member at a Texas organization clicked a spearphish link targeting their Microsoft credentials in a PDF file.

AD_4nXfooUIv9wWTGoQtEX5Qh93YalyobQTUGkEOFJMfixFbF_BRglxHDOaTA2k74xnT3v8WKDhQCpd41jofhojcS64gNpnbkNAinDtMVfD40W4zczNPzj792KtI6vxZxqxeLc8zUkxnVf0_XX2KEcL1fmM


In this instance, the phishing email was sent by the personal Gmail account of the staff member’s spouse, who had been compromised. The phishing email contained a link to a password protected PDF stored in Google Drive, which, upon being unlocked, contained a link to a Microsoft credential harvester. This is hard to detect because it involves both a trusted sender address and a password protected file that contains the phishing link.

Another spearphish was clicked by three staff members at a Kentucky organization on Dec 9th.

AD_4nXdmVlk-JTjwMFVouQtdnLo1xmPZMUq6rlRhS_QjgtH_z-n103v7lixCeFtxgs7AUnh1tzSwEFagu_M4VPSDUkFWeix3fMfOdO2ID7Um-GYFQacZg8lapMsrrdp3ksxy0tqVhvABKRbE4mGPup7RbSQ


This was delivered through a OneDrive file share outside the scope of normal email protection. Even seven days after it was detected by PIXM, it remained undiscovered by the entire VirusTotal community.

AD_4nXcywxBTk_H6P9LEDasJfhwD87WT1uZgGr4tFv_agAL9oyj7goUjMApfuSDkeNSZuRAY6qwUjDZ6331P-S1Z2L30lRA86g_RWIGZ7--pcMiRKQALQJUl3mOk_Y0HMO8ALfJWAfeXwTo8RbwSoqiaUF4



Credit Card UPS Phishing

Leading up to the holidays, PIXM picked up a surge of UPS phishing attacks clicked by staff members across districts in Washington, Kentucky, and Idaho.

To highlight one instance, a UPS phishing link leads to a page that says that a package has been returned because the delivery address is not clear. In order to have the package delivered by Dec 23rd, the page says, the user must update their address.

AD_4nXd7O50wRRcWSTG2QAi41_Yjwprm4gjIPls7M1qqTtlfgD9QEDa1NwNSaf_qhWCTK_T6w4bC6h00pa9ABfxMmjs16PXtnvmmTTOwEQaS8bn0pF63itdDt2uJAwDoF_6XldOAFtIf1-3b7redS5yiOQ



Upon clicking ‘Continue’, the user is directed to an address form, and is then further directed to an online payment form in order to pay for a minor supposed delivery fee. Numerous links on the phishing page actually linked to the legitimate UPS website. Scams like this leverage anxiety that packages arrive before Christmas. They are further difficult to detect by concealing credit card solicitation until the user has clicked through multiple forms.

Suggested Correctionss

  • Add the specified domains to your block lists.
  • Focus awareness efforts on high-risk credentials.
  • Educate users to exercise caution when opening links even when they are delivered from family members and involve password protected files.
  • Educate users that phishing in their personal email can pose serious risks.