Crooks are looking to harvest email credentials with a savvy campaign that uses the Typeform service to host the phishing page.
<div class="c-article__content js-reading-content"> <p>A W2 tax email scam is circulating in the U.S. using Typeform, a popular software that specializes in online surveys and form building. The campaign is aimed at harvesting victims’ email account credentials, researchers said.</p> <p>According to Armorblox, the campaign also bypasses native Google Workspace email security filters in the victims it examined.</p> <p>“The email impersonated an automated file-sharing communication from OneDrive, informing victims that they had received a file,” researchers explained in <a href="https://www.armorblox.com/blog/blox-tales-w2-tax-scam-using-typeform/" target="_blank" rel="noopener">an analysis</a> on Tuesday. “The email was sent from a Hotmail ID and was titled ‘RE: Home Loan,’ followed by a reference number and the date, making it seem like the email was part of an ongoing conversation to lend it more legitimacy.”</p> <p><a href="https://threatpost.com/newsletter-sign/"><img loading="lazy" class="aligncenter wp-image-141989 size-full" src="https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg" alt="" width="700" height="50"></a></p> <p>The links included in the emails purport to lead to a document called “2020_TaxReturn&W2.pdf,” researchers found. Instead, the links take users to a Typeform page where victims are asked to enter their email account credentials before being granted access to the file.</p> <p>However, entering email account information into the form only returns error messages. After several attempts, the campaign surfaces a message saying that “the document is secured” and that the user’s identity could not be verified.</p> <p>“It’s likely that the error messages could be a smokescreen for the attackers to gather as many account ID and password combinations as unsuspecting victims are willing to enter in an attempt to brute-force their way to gain access to the W2,” according to Armorblox. “In reality, there is no W2 pot of gold at the end of this malicious rainbow.”</p> <h2><strong>Evading Google Workspace Email Filters</strong></h2> <p>Researchers said that one of the most notable aspects of the campaign is its ability to skirt around email defenses, including native Google Workspace email security</p> <p>One of the ways it does that is by sending the emails from a newly created Hotmail domain. This has the effect of helping mails get by email authentication checks like <a href="https://threatpost.com/airline-dmarc-policies-lag-opening-flyers-to-email-fraud/158449/" target="_blank" rel="noopener">DMARC, DKIM and SPF</a>, which look for spoofed email addresses, among other things.</p> <p>“Attackers often send emails from newly created Gmail, Yahoo, and Hotmail IDs to circumvent any filters and blocklists in place that block known low reputation domains,” Armorblox researchers explained.</p> <p>Also, using Typeform to host the phishing page means that filters won’t clock the links as malicious since it’s a trusted application. Other phishing attacks have been observed exploiting Box, <a href="https://threatpost.com/crooks-tap-google-firebase-in-fresh-phishing-tactic/155967/" target="_blank" rel="noopener">Google Firebase</a>, Google Forms and Webflow in a similar manner.</p> <p>“Free online services like Typeform make our lives easier, but unfortunately also lower the bar for cybercriminals to launch successful phishing attacks,” researchers said.</p> <p>The campaign also employed a number of techniques on the social-engineering front to pass the eye tests of unsuspecting end users, according to the analysis.</p> <p>“The email title, content and context aimed to induce a sense of fear and urgency in the victims. By using tax and deadline-related anxieties that beset the best of us, attackers hope that victims click before they think,” researchers explained.</p> <p>They added, “The email includes a link that says ‘Learn about messages protected by Office 365’ that leads to a real Microsoft-hosted page with security information. Attackers often include such signifiers in emails to lull victims into a false sense of security (no pun intended).”</p> <p>And finally, the campaign replicates existing workflows by pretending to be automated file-sharing messages from OneDrive.</p> <p>“We get tons of such emails everyday informing us that someone has shared files with us, someone has replied to our message, someone has commented on a document and so on,” according to Armorblox. “When we see emails that seem similar (at first glance) to known email workflows, our brains tend to employ <a href="https://www.marketingsociety.com/think-piece/system-1-and-system-2-thinking" target="_blank" rel="noopener">System 1 thinking</a> and take quick action.”</p> <h2><strong>How to Avoid Phishing Attacks </strong></h2> <p>“Employees continue to fall for these scams because the emails are so authentic-looking, and it is difficult to tell the difference from the real thing,” Joseph Carson, chief security scientist at Thycotic, told Threatpost.</p> <p>Thus, a front line of defense is to develop better cybersecurity hygiene by educating employees on ways to detect email scams, he noted.</p> <p>“If an email does make it into the inbox, then go to the website and call the number to check if it is authentic and do not call the number if provided within the email as, most likely, it is fake also,” he advised. “Check the email sender address and not the display name. Check the email for spelling mistakes. Check any hyperlink addresses by hovering over them to see where they send you. However, do not click on the links. Also check your personal details for accuracy. These simple tips will help employees avoid a potential cybersecurity nightmare for their organization.”</p> <p>Hank Schless, senior manager of security solutions at Lookout, also cautions organizations to not forget about mobile device.</p> <p>“Security teams should be protecting employees across all endpoints to ensure they don’t fall victim to a phishing attack or download a malicious attachment that compromises the organization,” told Threatpost. “These types of scams are most effective on mobile devices, and attackers know this. For that reason, they are creating targeted phishing campaigns to take advantage of the mobile interface that makes it hard to spot a malicious message.”</p> <p>And finally, people shouldn’t assume that legitimate services equal a legitimate communication, according to Armorblox.</p> <p>“This piece of advice is also difficult to enact in practice, given the crowded nature of our inboxes,” according to the analysis. “However, try to be skeptical by default of any form that asks for your login credentials, even if the form is built using a legitimate service like Google or Typeform. These services are as easily available to cybercriminals as they are to the rest of us.”</p> <p><strong><em>Ever wonder what goes on in underground cybercrime forums? Find out on April 21 at 2 p.m. ET during a </em></strong><strong><em><a href="https://threatpost.com/webinars/underground-markets-a-tour-of-the-dark-economy/?utm_source=ART&utm_medium=ART&utm_campaign=April_webinar" target="_blank" rel="noopener">FREE Threatpost event</a></em></strong><strong><em>, “Underground Markets: A Tour of the Dark Economy.” Experts will take you on a guided tour of the Dark Web, including what’s for sale, how much it costs, how hackers work together and the latest tools available for hackers. </em></strong><strong><em><a href="https://threatpost.com/webinars/underground-markets-a-tour-of-the-dark-economy/?utm_source=ART&utm_medium=ART&utm_campaign=April_webinar" target="_blank" rel="noopener">Register here</a></em></strong><strong><em> for the Wed., April 21 LIVE event. </em></strong></p> <p> </p> <p><strong><em> </em></strong></p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="Tax Phish Swims Past Google Workspace Email Security" data-url="https://threatpost.com/tax-phish-google-workspace-email-security/165376/" data-counters="yes" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/web-security/">Web Security</a></li> </ul> </div> </div> </footer> </div>