[Wake Up Call] A Fresh Nespresso Domain Hijack Brews an MFA Phishing Scheme

02 May 2024

Attackers are launching phishing campaigns using an open-redirect vulnerability affecting a website belonging to coffee machine company Nespresso, according to researchers.

Open-redirect vulnerabilities enable attackers to send users to phishing sites via seemingly benign links. In this case, the attackers are sending emails that appear to be multi-factor authentication requests from Microsoft.

"This attack starts with an email," the researchers explain. "Albeit in this instance a very strange email that at first glance appears to be a multi-factor authentication request from Microsoft. The email sender is unaffiliated with Microsoft.

"At the bottom of the message it seems that the email has been forwarded twice. This creates a rather muddled message that the attacker likely fabricated entirely. Perhaps the intent of the 'forwarding' was to provide an explanation as to why the email doesn't originate from Microsoft. Regardless of the convoluted details, the overall message is clear."

If the user clicks the link, they'll be sent to a phony Microsoft login page designed to steal their credentials.

"The email urges the recipient to check their recent login activity," the researchers write. "Upon clicking the link, the user is first directed to the infected Nespresso URL, followed by a redirection to an .html file. The goal of using the Nespresso open redirect vulnerability is to evade security measures.

"Attackers know that some security vendors only inspect the initial link, not digging further to discover any hidden or embedded links. With this knowledge, it makes sense that the attacker would host the redirect on Nespresso, as the legitimate domain would likely be sufficient to bypass many security vendors, detecting only the reputable URL and not the subsequent malicious ones."

Attackers are launching phishing campaigns using an open-redirect vulnerability affecting a website belonging to coffee machine company Nespresso, according to researchers.

Open-redirect vulnerabilities enable attackers to send users to phishing sites via seemingly benign links. In this case, the attackers are sending emails that appear to be multi-factor authentication requests from Microsoft.

"This attack starts with an email," the researchers explain. "Albeit in this instance a very strange email that at first glance appears to be a multi-factor authentication request from Microsoft. The email sender is unaffiliated with Microsoft.

"At the bottom of the message it seems that the email has been forwarded twice. This creates a rather muddled message that the attacker likely fabricated entirely. Perhaps the intent of the 'forwarding' was to provide an explanation as to why the email doesn't originate from Microsoft. Regardless of the convoluted details, the overall message is clear."

If the user clicks the link, they'll be sent to a phony Microsoft login page designed to steal their credentials.

"The email urges the recipient to check their recent login activity," the researchers write. "Upon clicking the link, the user is first directed to the infected Nespresso URL, followed by a redirection to an .html file. The goal of using the Nespresso open redirect vulnerability is to evade security measures.

"Attackers know that some security vendors only inspect the initial link, not digging further to discover any hidden or embedded links. With this knowledge, it makes sense that the attacker would host the redirect on Nespresso, as the legitimate domain would likely be sufficient to bypass many security vendors, detecting only the reputable URL and not the subsequent malicious ones."

 

Related News

Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities

07 May 2024

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the U.K., and the U.S.

Read More

Understanding Vulnerabilities and Configuration issues

03 May 2024

Vulnerabilities refer to flaws or weaknesses in a system that can be exploited by a threat actor to perform unauthorized actions. These vulnerabilities can exist due to inadequate security controls, outdated systems, or inherent weaknesses in software and hardware. Examples include SQL injection, cross-site scripting, and buffer overflow vulnerabilities.

Read More

5 Hard Truths About the State of Cloud Security 2024

29 Apr 2024

While cloud security has certainly come a long way since the wild west days of early cloud adoption, the truth is that there's a long way to go before most organizations today have truly matured their cloud security practices. And this is costing organizations tremendously in terms of security incidents.

Read More