XPS Attachment Used for Phishing
While Phishing is never a good thing, it is interesting to see something different than your normal phishing attempt. We received an email today from Earl Ruberts about an email their IT department received from a purchasing department of another company with which they have no relationship. The email contained an attachment that had a .xps extension. They conducted scans of the attachment that came back clean and the email did not appear to be spoofed. They contacted the company to ask them if they sent it and found out they were actively cleaning up an account compromise. Since the email and attachment was suspicious, Earl asked us to take a look. Here is the body of the email:
Using a VM, I took a quick look at the attachment in notepad and it showed a structure that looked like an XPS file. An XPS extension stands for "XML Paper Specification" and if like Microsoft's version of a PDF using XML. So, I used Microsoft's built-in XPS viewer to open the file. This was where the phishing came into play. Here is what you see when you render the file:
The phishing folks use the ploy of a "Secure attached file" in the XPS file since this is supposed to be a copy of a check and "Payment Advice" in order to convince the victim they are being careful with their check. Also, the SharePoint references would be convincing to people if asking them to retrieve files, since many businesses use SharePoint internally for this purpose. The average user would probably click on this. The "OPEN FILE" portion contains is a hyperlink to hxxps://areticaempresarial[.]com[.]br/microsoftsharepoint/share.php
This again is continuing the ploy with use of "microsoftsharepoint" in the URLto help lure the victim into clicking. The URL is visible when you hover over it. If the user clicks the link, they are presented with the following screen:
The user would then be asked for their password from a site with a nice Microsoft logo (It is SharePoint, right?) and if they followed the directions in the attachment, they would provide their "professional" email and password credentials.
It seems that we have a compromised account being used to send phishing emails in order to phish more account credentials from other victims. This could really reek havoc on partners of a company with a compromised account(s). I would venture to guess that is not all that the accounts are being used for or will be used for in the future. Also, an XPS isn't a file type that you see often today and probably isn't on the prohibited file extension list of most email gateways. It's a file extension that if you aren't actively using it internally and you don't expect to get that type of file in from external, I'd recommend blocking it on your email gateway. This is also a great example of how important it is to train your employees to be suspicious of unexpected emails and to not just click on everything!
Lorna Hutcheson
ISC Handler
Comments
Anonymous
Dec 3rd 2022
9 months ago
Anonymous
Dec 3rd 2022
9 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
Anonymous
Dec 26th 2022
9 months ago
Anonymous
Dec 26th 2022
9 months ago
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
Anonymous
Dec 26th 2022
9 months ago
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
Anonymous
Dec 26th 2022
9 months ago
Anonymous
Dec 26th 2022
9 months ago
https://defineprogramming.com/
Dec 26th 2022
9 months ago
distribute malware. Even if the URL listed on the ad shows a legitimate website, subsequent ad traffic can easily lead to a fake page. Different types of malware are distributed in this manner. I've seen IcedID (Bokbot), Gozi/ISFB, and various information stealers distributed through fake software websites that were provided through Google ad traffic. I submitted malicious files from this example to VirusTotal and found a low rate of detection, with some files not showing as malware at all. Additionally, domains associated with this infection frequently change. That might make it hard to detect.
https://clickercounter.org/
https://defineprogramming.com/
Dec 26th 2022
9 months ago
rthrth
Jan 2nd 2023
8 months ago