Threat actors are now using a new and more effective phishing technique called adversary-in-the-middle (AiTM) in the hopes of stealing sensitive information.
Recently, a large-scale AiTM campaign was detected to have been targeting Google G-Suite users. AiTM is a phishing method that uses spoofed websites that deploy a proxy server between a target user and the website the user wants to visit. Attackers would gain the user’s password, take over login sessions and take over the session cookie.
Once obtained, threat actors launch business email compromise (BEC) campaigns against other targets. Microsoft experts concluded that this method was utilised to target more than 10,000 organisations since September 2021.
Researchers from cloud security company Zscaler detected that AiTM phishing attacks were now directed toward G-Suite users starting mid-July 2022. Researchers from Zscaler identified in their analysis that “This campaign specifically targeted chief executives and other senior members of various organisations which use G Suite.”
Users received password expiry emails with malicious embedded links that would supposedly “extend your access” were part of the attack chain. The link would redirect the user to open redirect pages of Google Ads and Snapchat to load the phishing page URL.
The attacker also fingerprinted the client to determine whether it was a real user or an automated analysis system. The researchers concluded that multi-factor authentication processes alone could no longer offer adequate protection against newer and more advanced phishing attacks.
Threat actors can now bypass multi-factor authentication protection on many different services with this method. Even though multi-factor authentication is an added layer of security, users should not rely on it entirely.
Tech giant Google reassures that Gmail has multiple layers of phishing protection to safeguard its users against these attacks. Safe Browsing is another service Google provides on top of its hardware security keys to detect attacks further. Still, it reminds its users to only click on links from trusted sources and never enter login credentials on pages that may seem illegitimate.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...