How Risk Actors are Pitting E mail Safety Merchandise In opposition to Every Different With Encoded URLs

E mail safety instruments akin to Safe E mail Gateways (SEGs) usually encode URLs which can be embedded in emails. This permits the safety equipment to scan the URL earlier than the recipient visits the web site. Oftentimes when SEGs detect URLs in emails which can be already SEG encoded they don’t scan the URLs, or the scanning reveals solely the safety software’s scanning web page and never the precise vacation spot. Consequently, when an e-mail already has SEG encoded URLs the recipient’s SEG usually permits the e-mail by way of with out correctly checking the embedded URLs. Risk actors have abused this for a while, however Q2 of this 12 months, and Could particularly, noticed a rise in menace actors making the most of SEG encoding malicious URLs earlier than sending them to victims.

Instruments Utilized in The Wild

The 4 instruments mostly seen in use by menace actors to encode URLs and bypass SEGs in Q2 2024 are VIPRE E mail Safety, BitDefender LinkScan, Hornet Safety Superior Risk Safety URL Rewriting, and Barracuda E mail Gateway Protection Hyperlink Safety. E mail campaigns utilizing these instruments to bypass SEGs have been seen in environments protected by all the pieces from Proofpoint to Microsoft ATP.

VIPRE E mail Safety

URLs encoded by VIPRE E mail Safety, particularly URLs encoded by url[.]emailprotection[.]hyperlink had been seen with 12 distinctive topics in early June 2024. These emails had topics just like the next subset:

Widespread E mail Topics
Overview & Signal: Partnership_Investment_Proposal.DOCX
New Contract and Termination Settlement.pdf
You’ve got a brand new encrypted VM from <recipient title or identifiable info>
Full: Increment Coverage and Customary Termination Settlement.pdf.
Wage Compensation Report 2024

 

Determine 1: E mail with embedded URL encoded by VIPRE E mail Safety’s url[.]emailprotection[.]hyperlink.

URLs encoded with VIPRE E mail Safety’s different encoding URLs: url2[.]mailanyone[.]web, url10[.]mailanyone[.]web, url12[.]mailanyone[.]web, and so on. had been seen primarily in Could of 2024 with over 200 distinctive topics. These emails had topics just like the next subset:

Widespread E mail Topics
7167-<recipient title or identifiable info>: Settle for the proposal and return
One Time Authentication Immediate
Notification Entry #27 -Could 15, 2024, 07:49:27 AM
8533-<recipient title or identifiable info>: Signal and Return to course of
<recipient title or identifiable info> Termination Settlement……623.docx

Determine 2: E mail with embedded URL encoded by VIPRE E mail Safety’s url10[.]mailanyone[.]web.

BitDefender LinkScan

URLs encoded by BitDefender LinkScan, particularly URLs encoded by lsems[.]gravityzone[.]bitdefender[.]com had been seen most frequently in early June 2024 with 8 distinctive topics. These emails had topics just like the next subset:

Widespread E mail Topics
Pressing Motion Required: Safe E mail Alert !!!
Oops, We Withheld Some Messages From you June 09 Case- #UMMQEGA7
<recipient title or identifiable info> e-Safe/e-File/0B6UCG Tuesday, June 11, 2024
Timesheet Replace Notification: View Ref-VJ7N8GO012P modifications made to your timesheet
Report Ticket 0168724 For <recipient title or identifiable info>

Determine 3: E mail with embedded URL encoded by BitDefender LinkScan’s lsems[.]gravityzone[.]bitdefender[.]com.

URLs encoded with BitDefender LinkScan’s different encoding URL, linkscan[.]io, had been solely seen in two campaigns in June of 2024. These emails had topics just like the next subset:

Widespread E mail Topics
Speedy Motion Required: Mail Server Error – Replace Entry on Tuesday 11/Jun/2024 – TicketID: LCCP-YLSNYA-FLLWK
Time-sheet For <recipient title or identifiable info>

Determine 4: E mail with embedded URL encoded by BitDefender LinkScan’s linkscan[.]io.

Hornet Safety Superior Risk Safety URL Rewriting

URLs encoded with Hornet Safety Superior Risk Safety URL Rewriting (seclinks[.]cloud-security[.]web) had been seen primarily in late Could and early June of 2024 with 8 distinctive topics. These emails had topics just like the next subset:

Widespread E mail Topics
PVX #5LOA: Full: Please Signal&Return #Ref-D786DYY37B(2)
Oops, We Withheld Some Messages From you June 09 Case- #UMMQEGA7
<recipient title or identifiable info> e-Safe/e-File/0B6UCG Tuesday, June 11, 2024
Timesheet Replace Notification: View Ref-VJ7N8GO012P modifications made to your timesheet
Time-sheet Submission: Please affirm your new time-sheet

Determine 5: E mail with embedded URL encoded by Hornet Safety Superior Risk Safety URL Rewriting’s seclinks[.]cloud-security[.]web.

URLs encoded with Hornet Safety Superior Risk Safety URL Rewriting’s different encoding URL, atpscan[.]international[.]hornetsecurity[.]com, had been solely seen in campaigns in late Could and early June of 2024 with 16 distinctive topics. These emails had topics just like the next subset:

Widespread E mail Topics
Accepted for less than 83574 – <recipient title or identifiable info>
#0IU6IB Overview Monday, June 10, 2024
YV8 72Q: Signal&Return #Ref-JB0UOYAY19P
4700-27Z Please full: Signal&Return #Ref-04020427Z
Motion Required: We witheld 9 messages from you.

Determine 6: E mail with embedded URL encoded by Hornet Safety Superior Risk Safety URL Rewriting’s atpscan[.]international[.]hornetsecurity[.]com.

Barracuda E mail Gateway Protection Hyperlink Safety

URLs encoded by Barracuda E mail Gateway Protection Hyperlink Safety, particularly URLs encoded by linkprotect[.]cudasvc[.]com had been seen with 19 distinctive topics in Q2 2024. These emails had topics just like the next subset:

Widespread E mail Topics
#23321041
Your DocXXX Await Your Approval Ref:#ezgyo4r
Complete Wellness Program for <recipient title or identifiable info> Workers
Your DocXXX Await Your Approval Ref:#hlufnew

Determine 7: E mail with embedded URL encoded by Barracuda E mail Gateway Protection Hyperlink Safety’s linkprotect[.]cudasvc[.]com.

Varieties Of Campaigns Seen Utilizing SEG Encoded URLs

There have been many several types of campaigns making use of SEG encoded URLs in Q2. A few of the most typical themes had been content material requiring a signature and voicemail or withheld e-mail notifications. As might be seen from the above Figures, DocuSign and Microsoft had been usually spoofed.

DocuSign

Numerous campaigns themed round content material requiring a signature spoofed DocuSign. Regardless of this spoofing, comparatively few of the campaigns made use of an precise DocuSign hyperlink which isn’t unusual amongst Credential Phishing emails spoofing DocuSign. That is doubtless as a result of the DocuSign hyperlinks are usually used to bypass SEGs and if the menace actor is already bypassing a SEG by encoding the malicious URL then they haven’t any want for an additional step that may get taken down.

Microsoft

Second solely to DocuSign, Microsoft was essentially the most generally spoofed model in e-mail campaigns making use of SEG encoded URLs in Q2 2024. Though not all of the Microsoft spoofing made sense, for instance, the Microsoft spoofing Time Sheet Report in Determine 3, it was nonetheless generally seen. It is a widespread tactic for menace actors searching for to abuse victims’ inherent belief in well-known manufacturers.

Leave a Reply

Your email address will not be published. Required fields are marked *