Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files

by Esmeralda McKenzie
Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files

Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files

Hackers Abuse Autodesk Power For Web internet hosting Weaponized PDF Files

Autodesk Power is an info-sharing platform for organizations to fragment paperwork and recordsdata within the cloud.

It additionally supports 2D and 3D records recordsdata, along side PDF recordsdata, which would possibly perhaps possibly presumably presumably be free to make utilize of when other Autodesk merchandise are subscribed.

EHA

Alternatively, a new attack campaign has been stumbled on.

This campaign abuses this Autodesk internet hosting platform to host malicious PDF recordsdata, which ends in phishing attacks on victims.

This phishing attack is aimed explicitly at harvesting Microsoft login credentials.

Technical Evaluation

In accordance to the experiences shared with Cyber Security News, threat actors were the utilize of compromised e mail accounts to gather and goal new victims.

The usage of compromised e mail accounts makes it much less suspicious for users to discuss over with the embedded Autodesk hyperlinks.

The emails sent by the threat actors from these compromised accounts additionally encompass the legitimate e mail signature footer.

Phishing e mail from compromised yarn with Signature footer (Offer: Netcraft)
The phishing e mail from a compromised yarn with Signature footer (Offer: Netcraft)

When victims click on on the Autodesk power hyperlinks on these emails, they are taken to the hyperlinks to gape the PDF document, which mainly contains the sender’s name and the company they work for to add belief to the phishing attack.

PDF hosted with Autodesk containing the sender’s name (Offer: Netcraft)
PDF hosted with Autodesk containing the sender’s name (Offer: Netcraft)

This PDF link will possess a “VIEW DOCUMENT” possibility, which embeds one other phishing link that would possibly perhaps snatch the visiting user to a Microsoft Login fabricate.

This fabricate looks exactly like the distinctive Microsoft login fabricate, wherein the victim is asked for his or her username and password.

Phishing fabricate (Offer: Netcraft)
Phishing fabricate (Offer: Netcraft)

After coming into their credentials, they are taken to a e book about staunch property funding hosted on Microsoft’s One Power carrier.

Since OneDrive is a Microsoft-owned product, it affords the affect to the user that the document they noticed used to be intended.

Alternatively, threat actors personal harvested the credentials thru the Spoof fabricate.

Staunch property funding document hosted on OneDrive (Offer: Netcraft)
Staunch property funding document hosted on OneDrive (Offer: Netcraft)

File

Mix ANY.RUN in Your Firm for Efficient Malware Evaluation

Are you from SOC, Risk Overview, or DFIR departments? If that is the case, it’s likely you’ll presumably also join a internet-based community of 400,000 impartial security researchers:

  • Staunch-time Detection
  • Interactive Malware Evaluation
  • Easy to Be taught by New Security Personnel contributors
  • Find detailed experiences with maximum records
  • Space Up Digital Machine in Linux & all Windows OS Variations
  • Non-public interaction with Malware Safely

In elaborate so that you simply can test all these parts now with utterly free ranking entry to to the sandbox:

Put up Phishing Ways

As threat actors now personal the victim’s Microsoft credentials, they would possibly be able to utilize them to invent unauthorized ranking entry to to sensitive company records and send many more phishing emails to goal privileged Microsoft accounts.

A outlandish habits used to be noticed, which used to be the variation in languages.

Risk actors are seen to personal computerized this phishing e mail, which adjustments the languages by the utilize of the sender’s locale.

To add proof to this speculation, an identical phishing e mail used to be sent from a Canadian manufacturing company that susceptible French within the PDF.

French model of the malicious PDF hosted on Autodesk (Offer: Netcraft)
French model of the malicious PDF hosted on Autodesk (Offer: Netcraft)

Organizations and staff are told to be responsive to phishing attacks.

Additionally, every login fabricate URL ought to be verified earlier than coming into the credentials.

Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

Source credit : cybersecuritynews.com

Related Posts