Phishing Robots

Phishing Robots


by TheAntiSocialEngineer on 23rd March 2017 in Blog

So it turns out us humans aren’t the only ones with a few flaws when it comes to an inbound phishing email! Often uttered from the crowds at every infosec event is the dreaded cliché statement, “Well, humans are the weakest links in security” but not today, stand proud as we take the time to shame our binary companions.

In testing and teaching phishing to organisations, the same things get repeated. Don’t click on the link, check the sender, check for legitimacy etc but we recently discovered these phishing basics can also have quite a bit of damage when it comes to online accounts.

Many online services have a feature whereby you can email the service and it will perform an action. They don’t validate the sender.

Let’s take a look at a few examples, Wunderlist. You can send an email to ‘[email protected]’ from [email protected] and it will forward a todo to the account that uses [email protected]. If you want to interact with this account you could just spoof the email address ‘[email protected]’ and send your emails to [email protected].

How about uploading some malicious APK’s to the victims todo list? Off course you can, just attach to the email.

You can also expand on the features by adding items to the subject line of the email. So now the victims malware can be selected #Important and flagged accordingly.

 

IFTTT I still don’t understand how to work this service, but I expect people will be able to turn off your connected devices for fun using your forged email address and sending it to ‘[email protected]’.

 

Imgur allows you to post a picture to your Imgur account via email. Well let’s say we found the most popular Imgur accounts or corporate accounts, spoofed their email address and started uploading what we wanted to their account? I don’t think ‘PeanutBuddha’ with over 2 million up votes would like that.

 

With limited success it is also possible to dispatch notifications to services like Yammer. You want to email all of the sales department at a company – easy!

Just grab the email address of one salesman and send a spoofed email to [email protected]. Why stop there though? why not send a few phishing links to [email protected] too. Within seconds of sending one spam laden, malware infected email it can be spread around using their own comms platform.

 

British Gas home systems… accept email and SMS input, so now attackers can have a choice in what medium they wish to spoof. Always handy to know someone can be messing with your internet connected trash whilst you are away via spoofed text messages.

 

Spoofing an email

Whilst this is done all the time and is quite common in phishing emails not everyone might be aware that you can spoof an email sender. So next time you receive an email and you recognise the sender – it might not be correct. There is normally no checks on the ‘MAIL FROM’ element of an email. It’s trivially easy to send a message from [email protected] and many email systems are none the wiser.

 

The Fix

Some companies like Google, Evernote and Facebook to name just a few already know what the solution is! They use secret email addresses that are unique, similar to [email protected] whilst this solution is more secure it is not doing the same thing. You see when a company uses a generic mail in address then their system must connect this incoming email to the account and it does this by using the from address of the email (The one that can be spoofed) but a secret/unique email address is allocated per account, meaning emails to that address can only ever end up in that account. To mess with this system you would need to spoof the email aaaaaand! know the secret email address.

 

We have reached out to several companies effected to ensure they are aware of the issue, due to the nature of the issue it will not be fixed by everyone that uses a static email address. Whilst this does bring several fairly obvious concerns the companies mentioned were only the ones I ran into – thousands more remain and should not be viewed in a negative manner because of this post. It’s the internet, everything has a bug in – some can’t be fixed.

 

If you would like assistance in testing for issues like these, make contact today.

Further reading can be found in our informational PDF 


要查看或添加评论,请登录

Richard De Vere的更多文章

  • We All Work For Namecheap

    We All Work For Namecheap

    So you want to start your first phishing site. First of all, you need to purchase a domain.

    8 条评论
  • How We Could Chat On Your WeChat

    How We Could Chat On Your WeChat

    Pushing the boat out’! The rural settings of the Yorkshire Pennines is a nice place to live if you just tweak a few…

    2 条评论
  • The Power of the Flower

    The Power of the Flower

    When you work in an office, there’s nothing better than when someone brings in their new baby or puppy for a meet and…

    2 条评论
  • Why You Should Be Concerned By Jane’s Abrupt Emails

    Why You Should Be Concerned By Jane’s Abrupt Emails

    There’s nothing more satisfying than removing the “kind” from “kind regards” and smashing that send button when you’ve…

    1 条评论
  • Those Who Cannot Remember The Past

    Those Who Cannot Remember The Past

    Information security is a fast paced industry. Everyday, people are dropping exciting projects on GitHub, data breaches…

  • Trivial Mistakes On Trello

    Trivial Mistakes On Trello

    Open Source Intelligence (OSINT) is the practice of using publicly available data about a target company or person. In…

  • Shut Up About Facebook

    Shut Up About Facebook

    People seem annoyed recently that a little known company called Cambridge Analytica have been accused of doing some…

  • Phishing, Evolved.

    Phishing, Evolved.

    When we talk about phishing, the first thing people would associate with is the traditional phishing email. The click…

  • Let’s forget the phishing dangers, is email getting us down?

    Let’s forget the phishing dangers, is email getting us down?

    In no way are we trying to diminish the importance of good email security practice, but sometimes I think about the…

  • Did the AA have a minor breakdown?

    Did the AA have a minor breakdown?

    There have been rumours of a potential data breach over at The AA UK, through a series of statements and replies…

    4 条评论

社区洞察

其他会员也浏览了