Operation Uncle Scam - AI-Powered Phishing Attack Steals Microsoft Dynamics 365 Credentials

Operation Uncle Scam - AI-Powered Phishing Attack Steals Microsoft Dynamics 365 Credentials

Security researchers at Perception Point have uncovered a sophisticated phishing campaign, dubbed "Uncle Scam." In this AI-powered campaign, threat actors impersonate U.S. government agencies to send fraudulent tender invitations to numerous American enterprises.

The attackers employ advanced techniques, including interactive kits and large language models (LLMs), to create highly convincing phishing emails.

The phishing operation begins with an email purportedly from the General Services Administration (GSA), inviting recipients to bid on a federal project.


The email contains a link that redirects users to a spoofed GSA website, designed to closely mimic the legitimate site. This fake site includes navigation links and search options that lead to actual GSA pages, enhancing its credibility and making it challenging for users to identify the deception.


Upon clicking the "Register For RFQ" button, users encounter a CAPTCHA page, a tactic used by attackers to evade detection by automated security tools. Once users submit their details, the attackers successfully harvest their credentials.

The phishing site is nearly identical to the legitimate site, assuaging visitors of its supposed authenticity.

The attackers have also incorporated a detailed pop-up message that walks users through how to register for the RFQ, requiring multiple clicks to reach the fake login site.

According to the Perception Point report shared with Cyber Security News, "Upon clicking the link, the user is redirected to a spoofed GSA page, complete with a domain mimicking (gsa-gov-dol-procurement-notice(.)procure-rfq(.)online) the legitimate GSA domain (www.gsa.gov). The phishing site is nearly identical to the legitimate site, assuaging visitors of its supposed authenticity."


This behavior not only enhances the site's credibility but also makes it more difficult for users to realize they are on a malicious site.

Abuse of Microsoft’s Dynamics 365 Marketing Platform

A notable aspect of this campaign is the abuse of Microsoft's Dynamics 365 Marketing platform. Attackers leverage the domain dyn365mktg.com to create subdomains and send malicious emails.

This domain's association with Microsoft allows phishing emails to bypass spam filters and reach inboxes, increasing the campaign's effectiveness.

This domain is pre-authenticated by Microsoft, complying with DKIM and SPF standards, which ensures that emails from this domain are more likely to bypass spam filters and land directly in inboxes.

This pre-authentication and association with Microsoft contribute to high deliverability, making phishing emails sent from dyn365mktg(.)com less likely to be flagged as spam.

Additionally, the domain's built-in credibility, stemming from its link to a trusted marketing platform, makes emails from this domain appear more legitimate, increasing the effectiveness of phishing campaigns.

Perception Point researchers identified two variations of the phishing campaign, both crafted with the help of LLMs. These models enable attackers to generate sophisticated and contextually accurate emails at scale. The emails impersonate different U.S. government departments, maintaining a professional tone and incorporating department-specific details.

Protection Measures

To protect against such sophisticated phishing attacks, organizations are advised to:

Jaclyn Yeager

Store Assistant Manager at Dollar General

2 周

Friends, I want to share my experience with an Office 360 email scam and how I was able to recover my funds. I never thought I’d fall victim to fraud, but these scams are getting more sophisticated every day. I received what looked like a legitimate email, prompting me continue with payment Before I knew it, I've already made payment to the wrong account At first, I felt hopeless, but I took action. I reached out to a cybersecurity team specializing in fraud recovery Fraud Guard. Through their expertise, they traced the transactions, worked through security protocols, and successfully helped me retrieve my lost funds. Financial fraud is a serious issue, and victims often feel ashamed or alone—but there is help out there. If you or someone you know has been targeted, don’t hesitate to seek support and take steps to fight back. contact their Security Agent on WhatsApp: +1 (352) 665-2970. IG: fraud_guard

回复
Bob Olson

Network Administrator

7 个月

2 or 3 times a week, I get a text message from my mother with a screenshot of an e-mail she received asking me if it's a legit e-mail or not. I'm happy that she does this but the sad thing is she's terrified. This is where we as cybersecurity professionals need to protect our human assets by educating them on how to spot social engineering tricks. It was only a matter of time before threat actors started using AI to create believable phishing e-mails.

回复
Mohd Asma

Business Development | Sales & Marketing | Cybersecurity Sales Helping businesses scale through strategic sales & partnerships | Open to new opportunities

7 个月
Bozenna Slominski

Empowering decentralized innovation! ?? Distributor/Reseller for #CyberSecurity & #Decentralized solutions including #VogonCloud, #FCCN by Spectral Capital, IBA ??

7 个月

DQLDB- Decentralization is a solution! checkout #Spectralcapital dot com

Mike Deweerd

Senior Sales Consultant at Southern Glazer's Wine & Spirits

7 个月

Checkout #CYBRINTERNATIONAL.AI Hubzone accredited and partners with IBM, RAYTHEON, HEWLITT PACKARD and OTC bound in a few short weeks

要查看或添加评论,请登录

Cyber Security News ?的更多文章

社区洞察

其他会员也浏览了