Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (2024)

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (1)

New research from Proofpoint exposes a new massive credential phishing attack campaign aimed at top-level executives in more than 100 organizations worldwide. This cybersecurity attack leverages the EvilProxy phishing kit and bypasses two-factor authentication.

We break down the specifics of EvilProxy, including which accounts have been targeted, and provide tips on protecting your business from this threat.

Jump to:

  • What is EvilProxy?
  • EvilProxy attack chain
  • Thousands of high-value Microsoft cloud accounts targeted
  • Maintaining fraudulent access to the mailboxes
  • How to protect from this security threat

What is EvilProxy?

EvilProxy is a phishing-as-a-service kit that was first exposed by cybersecurity company Resecurity in September 2022. This kit has the ability to run phishing attacks with reverse proxy capabilities that enable it to steal credentials and bypass 2FA by deploying adversary-in-the-middle techniques (Figure A).

Figure A

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (2)

Any cybercriminal can acquire EvilProxy and start using it via a simple interface that allows the creation of phishing campaigns with customizable options. The service sets up a phishing website according to the selected options and is then ready to go. When an unsuspecting user visits the phishing page, they provide their credentials. The phishing page then asks for the 2FA code for authentication to the service. Once provided, the code is immediately used by the kit to get access to the user’s account by opening a session.

Daniel Blackford, threat researcher at Proofpoint, told TechRepublic that EvilProxy is sold in underground forums and Telegram channels, and added that “The basic version of EvilProxy costs a few hundred dollars, but it depends on many parameters like: feature set, number of targeted users, etc.”

EvilProxy attack chain

The attack campaign starts with emails pretending to come from known and trusted services or brands such as DocuSign, Adobe or Concur. The emails contain a malicious link leading the user to an open redirection at a legitimate website such as YouTube or Slickdeals (Figure B) in an attempt to avoid detections at the email level.

Figure B

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (3)

A series of redirecting websites (Figure C) follow in an unpredictable way, aiming to lower the chances of discovery. The user lands on the EvilProxy phishing website, which in this campaign is a Microsoft login page functioning as a reverse proxy.

Figure C

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (4)

To hide the email address of the victim while doing the redirections and avoid automatic scanning tools detections, the attackers use a special encoding and only use compromised legitimate websites to upload their PHP code to decode the email address before landing on the EvilProxy phishing page.

Thousands of high-value Microsoft cloud accounts targeted

This attack campaign sent approximately 120,000 phishing emails to hundreds of targeted organizations worldwide between March and June 2023, with the goal to steal users’ Microsoft 365 cloud credentials.

According to Proofpoint, the list of targeted users includes many high-value targets such as vice presidents and C-level executives from leading companies. The attackers ignored employees in lower positions. As stated by the researchers, it seems reasonable to think the threat actor used organizational information acquired from public sources to sort out who would be interesting.

Statistics amongst hundreds of compromised users reveal that 39% were C-level executives, of which 17% were chief financial officers and 9% were presidents and chief executive officers. Managers were 32% of the compromised users (Figure D).

Figure D

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (5)

Oddly, users with a Turkish IP address were redirected to the legitimate web page, which suggests the threat actor might come from that country or is actively ignoring any Turkish user account. Numerous virtual private network IP addresses were also redirected to the legitimate website instead of the EvilProxy page.

While the goal of this attack campaign remains unknown, this kind of attack generally leads to financial fraud or sensitive data exfiltration. The threat actor might also sell access to these high-value mailboxes to other cybercriminals.

Maintaining fraudulent access to the mailboxes

Once an active session is established on a compromised account, the threat actor adds its own multifactor authentication method in the Microsoft 365 parameters, adding Authenticator App to it (Figure E).

Figure E

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (6)

Afterward, the threat actor no longer needs EvilProxy’s reverse proxy feature to log in to the compromised account and simply logs in with the credentials and a code provided on their own Authenticator application.

How to protect from this security threat

Here are four tips for protecting against the EvilProxy threat.

  • Use email security solutions to block malicious emails sent to employees.
  • Train employees to detect such phishing attacks.
  • Deploy network security solutions to try to detect phishing, malware or other threats.
  • Run phishing attack simulations to help IT raise awareness amongst employees.

It’s also advised to use FIDO2-based physical keys when possible because that kind of hardware securely stores a private key that isn’t normally accessible to the attacker, even if the person is intercepting all communications between the user’s device and the online service.

Disclosure: I work for Trend Micro, but the views expressed in this article are mine.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives (2024)
Top Articles
Tornado Cash: Why Is It Popular with Hackers? - ImmuneBytes
Dodd-Frank: Title XIV - Mortgage Reform and Anti-Predatory Lending Act
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Dmv In Anoka
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Umn Biology
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 6044

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.