Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    What's Hot

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home»Cyber Security»‘Picture-in-Picture’ Obfuscation Spoofs Delta, Kohl’s for Credential Harvesting
    Cyber Security

    ‘Picture-in-Picture’ Obfuscation Spoofs Delta, Kohl’s for Credential Harvesting

    justmattgBy justmattgJune 3, 2023No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    Hackers are turning to obfuscation tactics relying on glossy advertising photos from Delta Airlines and retailer Kohl’s, tricking users into visiting credential harvesting sites and giving up personal information.

    A recent campaign analyzed by Avanan showed how threat actors hide malicious links behind convincing photos offering gift cards and loyalty programs from such trusted brands. More broadly, the campaign is part of a larger trend of cybercrooks updating old tactics with new tooling — such as AI — that makes phishes more convincing.

    Avanan researchers, who dubbed the obfuscation technique “picture in picture,” noted that the cybercriminals behind the attacks are simply linking the marketing photos to malicious URLs. This is not to be confused with steganography, which encodes malicious payloads at the pixel level within an image.

    Jeremy Fuchs, cybersecurity researcher and analyst at Avanan, notes that steganography is often super complex, and “this is a much simpler way of doing things that might still have the same impact and is easier for the hackers to replicate at scale.”

    Corporate URL Filters Stymied by Picture Obfuscation

    While straightforward, the picture-in-picture approach makes it more difficult for URL filters to pick up the threat, Avanan researchers noted.

    “[The email will] look clean [to filters] if they aren’t scanning within the image,” according to the analysis. “Often, hackers will happily link a file, image, or QR code to something malicious. You can see the true intention by using OCR to convert the images to text or parsing QR codes and decoding them. But many security services don’t or can’t do this.”

    Fuchs explains that the other key benefit of the approach is to make the maliciousness less apparent to targets.

    “By tying in social engineering to obfuscation, you can potentially present end-users with something very tempting to click on and act on,” he says, adding the caveat that if users hover over the image, the URL link is clearly not related to the spoofed brand. “This attack is fairly sophisticated, although the hacker probably loses points by not using a more original URL,” he said.

    While the phish casts a wide consumer net, businesses should be aware given that airline loyalty program communications often go to corporate inboxes; and, in the age of remote work, many employees are using personal devices for business, or accessing personal services (like Gmail) on business-issued laptops.

    “In terms of impact, [the campaign] was aimed at a large number of customers, in multiple regions,” Fuchs adds. “While it’s hard to know who the perpetrator is, things like this can be often easily downloaded as ready-to-go kits.”

    Using Gen AI to Update Old Tactics

    Fuchs says that the campaign fits in with one of the emerging trends seen in the phishing landscape: spoofs that are nearly indistinguishable from legitimate versions. Going forward, the use of generative AI (like ChatGPT) to aid obfuscation tactics when it comes to image-based phishing attacks will only make these harder to spot, he adds.

    “It’s super easy with generative AI,” he says. “They can use it to quickly develop realistic images of familiar brands or services and do so at scale and without any design or coding knowledge.”

    For instance, using only ChatGPT prompts, a Forcepoint researcher recently convinced the AI into building undetectable steganography malware, despite its directive to refuse malicious requests.

    Phil Neray, vice president of cyber defense strategy at CardinalOps, says the AI trend is a growing one.

    “What’s new is the level of sophistication that can now be applied to make these emails appear to be almost identical to emails you would receive from a legitimate brand,” he says. “Like the use of AI-generated deepfakes, AI now makes it much easier to create emails with the same textual content, tone, and imagery as a legitimate email.”

    In general, phishers are doubling down on what Fuchs calls “obfuscation within legitimacy.”

    “What I mean by that is hiding bad things in what looks like good things,” he explains. “While we’ve seen plenty of examples of spoofing legitimate services like PayPal, this uses the more tried-and-true version, which includes fake, but convincing looking, images.”

    Leveraging URL Protection to Protect From Data Loss

    The potential implications of the attack for businesses are monetary loss and data loss, and to defend themselves, organizations should first look to educate users about these types of attacks, stressing the importance of hovering over URLs and looking at the full link before clicking.

    “Beyond that, we think it’s important to leverage URL protection that uses phishing techniques like this one as an indicator of an attack, as well as implementing security that looks at all components of a URL and emulates the page behind it,” Fuchs notes.

    Not everyone agrees that existing email security isn’t up to the task of catching such phishes. Mike Parkin, senior technical engineer at Vulcan Cyber, notes that many email filters would catch these campaigns and either mark it as spam at worst, or flag it as malicious.

    He notes spammers have been using images in lieu of text for years in the hopes of bypassing spam filters, and spam filters have evolved to deal with them.

    “While the attack has been fairly common of late, at least if the spam in my own junk mail folder is any indication, it’s not an especially sophisticated attack,” he adds.

    AI-enabled attacks might be a different story though. CardinalOps’ Neray says the best way to fight those more advanced image-based attacks is to use large amounts of data to train AI-based algorithms how to recognize fake emails — by analyzing the content of the emails themselves as well as by aggregating information about how all other users have interacted with the emails.

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal
    Next Article EC-Council’s Certified CISO Hall of Fame Report 2023
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    [mc4wp_form id=3515]
    Demo
    Top Posts

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Latest Reviews
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    justmattgApril 16, 2024

    [ad_1] Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” takeover…

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Demo
    MOST POPULAR

    Name That Toon: Last Line of Defense

    April 16, 2024

    California mountain lion P-22 left mark on wildlife conservation

    January 1, 2023

    Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

    January 1, 2023
    OUR PICKS

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑