Perception Point’s security research team has identified an alarming new phishing campaign. Attackers are abusing Microsoft Office Forms to launch sophisticated two-step phishing attacks. Office Forms, typically used for creating surveys and quizzes, are now being leveraged by threat actors to trick targeted users into divulging their Microsoft 365 (M365) credentials.
“Form” Phishers With Love
Attackers create legitimate-looking forms on Microsoft Office Forms, embedding malicious links within the forms. These forms are then sent to targets en-masse via email under the guise of legitimate requests such as changing passwords or accessing important documents, mimicking trusted platforms and brands like Adobe or Microsoft Sharepoint document viewer.
Threat actors often use the email accounts of breached business partners and vendors to deliver two-step phishing attacks across supply chains, a tactic known as “external account takeover” or vendor email compromise.
How It Works
- Email Message: The victim receives an email with a link to a Microsoft Office Form.
- Form: The form hosted on a legitimate service appears authentic, requesting the user to click a link to view a document and fill out the questionnaire.
- Redirect: Clicking the link leads the user to a fake login page, such as a Microsoft 365 or Adobe account page, designed to harvest credentials.
Attackers enhance their forms’ credibility by using convincing page titles and known favicons. Favicons are small icons displayed in the browser tab, and by using Microsoft familiar icons, attackers increase the perceived legitimacy of their fake pages. These visual cues can easily trick users into believing they are on a genuine Microsoft site.
Combined with the legitimate https://forms.office.com URL, the attackers achieve a convincing “look and feel” of a Microsoft page.
The Two-Step Phishing Kill Chain
In a two-step phishing attack, the attacker first gains access to a legitimate email account and sends targeted emails from this compromised account. These messages appear trustworthy, prompting recipients to click on a link that leads to a legitimate website. This is the first step, where the attacker uses the high reputation of legitimate sites like Office Forms, Canva, and many others to evade detection.
The second step occurs when the user clicks another link on the legitimate site, redirecting them to a spoofed page designed to steal credentials.
Example 1:
Phishing email example : M365-looking error message prompts users to restore their Outlook messages
Microsoft 365 Outlook “first step” – malicious URL is disguised as a necessary step for M365 authentication on an Office Form, the URL is embedded within the form’s question field
Microsoft 365 Outlook “second step” – a spoofed M365 login page
Microsoft 365 Outlook “second step” – a spoofed M365 login page
Example 2:
Phishing email example: a breached vendor’s email account is used to send out a bid invitation or an invoice to the target user
Microsoft Document “first step” – the user is prompted to click a link for viewing a sensitive document.
Microsoft Document “second step” – the actual fake login M365 page is used to collect the victim’s credentials.
Another variant caught by Perception Point – the second step’s phishing login page impersonates Adobe
The recent surge in two-step phishing campaigns absorbed by Perception Point researchers (July 2024)
Why Two-Step Phishing Evades Gateways and Native Detection (Microsoft Defender)
- Legitimate Origin: The attack originates from compromised legitimate accounts, making it difficult for email security solutions to flag the emails as malicious.
- Familiarity: Recipients are more likely to trust and engage with emails from known senders, increasing the attack’s success rate.
- High Reputation Sites: The first link often leads to a high-reputation site, bypassing security filters. The malicious intent only becomes apparent at the second stage.
How Perception Point Prevents These Forms-Gone-Wrong
Perception Point employs an advanced object detection model to counter two-step phishing attacks. This model takes a screenshot of each webpage and identifies clickable elements, simulating the victim’s interaction. The model follows each link and analyzes the subsequent pages for malicious content. This approach ensures that even if the initial link appears benign, any malicious payload in subsequent steps is detected and blocked.
To learn more about how Perception Point can protect your organization, book a demo today!