{"id":51951,"date":"2024-08-09T13:38:05","date_gmt":"2024-08-09T17:38:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=51951"},"modified":"2024-08-09T13:38:05","modified_gmt":"2024-08-09T17:38:05","slug":"phishing-as-a-service-onnx-marketplace","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/phishing-as-a-service-onnx-marketplace\/51951\/","title":{"rendered":"Automated phishing"},"content":{"rendered":"<p>Researchers have discovered a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/onnx-phishing-service-targets-microsoft-365-accounts-at-financial-firms\/\" target=\"_blank\" rel=\"nofollow noopener\">phishing marketplace called ONNX Store<\/a>, which gives cybercriminals access to tools for hijacking Microsoft 365 accounts, including a means for bypassing two-factor authentication (2FA). This enables threat actors to crank out phishing attacks on both Microsoft 365 and Office 365 email accounts. Corporate information security teams should be aware of this threat and tool up with anti-phishing protection. Let\u2019s take a closer look at the danger\u2026<\/p>\n<h2>A malicious attachment with a QR code and 2FA bypass<\/h2>\n<p>The researchers\u2019 report describes an attack using ONNX Store phishing tools that targets employees of several financial institutions. First, the victims receive emails seemingly from their HR departments on the topic of remuneration as bait.<\/p>\n<p>The emails contain PDF attachments containing a QR code to be scanned in order to gain access to a \u201csecure document\u201d with \u201cvital information\u201d about the recipient\u2019s salary. The idea here is to get the victim to open the link not on a work computer \u2014 which most likely has anti-phishing protection, but on a personal smartphone \u2014 which may well not.<\/p>\n<p>The link opens a phishing site mimicking a Microsoft 365 login page. Here, the victim is asked to enter their username and password, followed by a one-time 2FA code.<\/p>\n<div id=\"attachment_51953\" style=\"width: 1311px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/08\/09133534\/phishing-as-a-service-onnx-market-2.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-51953\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/08\/09133534\/phishing-as-a-service-onnx-market-2.png\" alt=\"Phishing page mimicking the Microsoft 365 login portal\" width=\"1301\" height=\"1060\" class=\"size-full wp-image-51953\"><\/a><p id=\"caption-attachment-51953\" class=\"wp-caption-text\">The fake Microsoft login page prompts victims to enter their credentials and a one-time 2FA code. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/onnx-phishing-service-targets-microsoft-365-accounts-at-financial-firms\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>All of this information of course goes straight to the attackers. One-time 2FA codes usually have a very short lifespan \u2014 often just 30 seconds. Therefore, to speed up delivery of information, the phishing kit uses the WebSocket protocol, which provides real-time communication.<\/p>\n<p>Armed with the stolen credentials and still-valid code, the attackers immediately log in to the account and gain full access to the victim\u2019s correspondence. This access can then be exploited for <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-bec-attack\/34135\/\" target=\"_blank\" rel=\"noopener nofollow\">business email compromise (BEC)<\/a> and other attacks.<\/p>\n<h2>Phishing-as-a-service: plenty of phish in the sea<\/h2>\n<p>The hub of this phishing operation is the Telegram instant messenger. ONNX Store embraces automation to the fullest \u2014 all interaction with users is through Telegram bots.<\/p>\n<p>Its creators provide phishing services on a subscription basis. The prices are quite low: for example, a monthly subscription for harvesting Microsoft 365 account passwords would cost a potential attacker $200 without a 2FA bypass \u2014 $400 with it.<\/p>\n<p>Even small-time cybercriminals can afford that. For this modest investment, they get access to a set of finely-tuned phishing tools. All they have to do is to select an attackable target and devise a monetization scheme.<\/p>\n<h2>How to protect your organization against advanced phishing<\/h2>\n<p>It\u2019s the low-entry threshold that makes the phishing-as-a-service model such a threat: the circle of cybercriminals with dangerous tools at their disposal becomes much wider. Therefore, we strongly advise that you take preemptive measures against an advanced phishing attack on your organization. Here\u2019s what we recommend:<\/p>\n<ul>\n<li>Consider using <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-two-factor-authentication\/48446\/#fido-u2f\" target=\"_blank\" rel=\"noopener nofollow\">FIDO U2F hardware tokens<\/a> (also known as YubiKeys) or <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-set-up-passkeys-in-google-account\/49515\/\" target=\"_blank\" rel=\"noopener nofollow\">passkeys<\/a> for 2FA. These tools negate even the most sophisticated covert phishing attacks.<\/li>\n<li>Deploy a <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a> with anti-phishing protection on all corporate devices, including smartphones and tablets.<\/li>\n<li>Conduct regular security-awareness training to train employees to recognize and deal with suspicious emails. Our interactive <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> provides everything you need on this and more.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.<\/p>\n","protected":false},"author":2726,"featured_media":51952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[1218,3146,2141,19,4600,2816,187,390,76,1557,422],"class_list":{"0":"post-51951","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-2fa","10":"tag-account-hijacking","11":"tag-business","12":"tag-email","13":"tag-microsoft-365","14":"tag-office-365","15":"tag-passwords","16":"tag-pdf","17":"tag-phishing","18":"tag-qr-codes","19":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-as-a-service-onnx-marketplace\/51951\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-as-a-service-onnx-marketplace\/27862\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-as-a-service-onnx-marketplace\/23157\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-as-a-service-onnx-marketplace\/30506\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-as-a-service-onnx-marketplace\/28038\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-as-a-service-onnx-marketplace\/38028\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-as-a-service-onnx-marketplace\/28177\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-as-a-service-onnx-marketplace\/33972\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-as-a-service-onnx-marketplace\/33634\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=51951"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51951\/revisions"}],"predecessor-version":[{"id":51955,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51951\/revisions\/51955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/51952"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=51951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=51951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=51951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}