Sponsored: Proofpoint on the rise of ClickFix attacks
Dec 8, 2024
auto_awesome
Selena Larson, a Senior Threat Intelligence Analyst at Proofpoint, dives into the unsettling world of cybersecurity threats. She reveals how attacker-in-the-middle phishing techniques are evolving to outsmart two-factor authentication. The discussion also uncovers the rising 'click fix' attacks, where cybercriminals masquerade as tech support to install malware on unsuspecting users' devices. With insights on credential theft and defensive strategies, Larson emphasizes the need for heightened awareness and smarter security practices.
Attacker-in-the-Middle phishing is increasingly prevalent, employing advanced techniques to effectively bypass multi-factor authentication and steal sensitive information.
The evolution of social engineering, particularly the ClickFix tactic, emphasizes the importance of user awareness and proactive security measures against malware threats.
Deep dives
Prevalence of Attacker-In Phishing
Attacker-in phishing is becoming increasingly common, particularly through techniques like reverse proxies and relays, which allow threat actors to steal usernames, passwords, and multi-factor authentication (MFA) tokens. Kits such as Mamba and Tycoon exemplify these phishing methods, with services like Evil Proxy and Evil Jinx facilitating the attacks by rewriting sites in real-time. The sheer volume of these phishing campaigns is significant, often targeting O365 and Gmail credentials with thousands of phishing messages sent out. As MFA is widely used, attackers have adapted by utilizing these advanced techniques to bypass defenses, reinforcing the necessity for organizations to enhance their security measures.
The Click Fix Technique
Click fix is a social engineering tactic that manipulates users into running malicious PowerShell code by presenting fake error messages and solutions. This method has gained popularity due to its simplicity and effectiveness, with attackers capitalizing on users' desire for quick fixes without fully understanding the risks involved. The emergence of reCAPTCHA phishing variants utilizing click fix demonstrates how attackers leverage familiar web elements to instill trust in users. To counter this threat, limiting PowerShell execution and enhancing user awareness are critical strategies for organizations looking to protect against such socially engineered attacks.
Evolution of Social Engineering Techniques
Social engineering continues to evolve, with attackers increasingly relying on human interaction and trust-building to execute their strategies. Threat actors are now engaging in benign conversations, fostering a rapport with potential victims before initiating the malicious aspects of their schemes, which can include requests for sensitive information or executing malware. This shift is prominent among various cybercriminals and advanced persistent threat (APT) groups, as they aim to develop trust to increase the likelihood of victim cooperation. The growing complexity of these methods signifies a move away from conventional one-click attacks, highlighting the need for enhanced cognitive awareness among users to thwart sophisticated threats.
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Proofpoint senior threat intelligence analyst Selena Larson about the rise of Attacker-in-the-Middle phishing and ClickFix social engineering campaigns.