Phishing attacks abusing SaaS platforms see a massive 1,100% growth

29 August 2022

Threat actors are increasingly abusing legitimate software-as-a-service (SaaS) platforms like website builders and personal branding spaces to create malicious phishing websites that steal login credentials.

According to a new report by PaloAlto, researchers have seen a sharp rise in this abuse, with the data collected by the firm showing a massive increase of 1,100% from June 2021 to June 2022.

The advantages of using SaaS for phishing include evading alerts from email security systems, enjoying high availability, and bypassing the need to learn how to code to create websites that appear legitimate

Also, because SaaS platforms simplify and streamline the process of creating new sites, phishing actors can easily switch to different themes, scale up or diversify their operations, and quickly respond to reports and takedowns.

 

Services abused for phishing

Researcher has divided the abused platforms into six categories: file sharing and hosting sites, form and survey builders, website builders, note-taking and documentation writing platforms, and personal portfolio spaces.

Researcher filtering systems recorded a growth in the abuse across all categories, but the most significant were website builders, collaboration platforms, and form builders.

Also, the stats indicate a notable rise in October 2021, based mainly on the sudden uptick in the abuse of form builders.

In 2021, researcher reported about the rampant abuse of "typeform.com" for phishing, an older report from Trend Micro mentioned "123formbuilder.com", "formtools.com", and "smartsurvey.co.uk", while another researcher highlighted the abuse of "Canva.com".

Around the same time, another uptick was spotted, augmented by the abuse of a personal branding site the report doesn't name.

 

How the services are used

The report explains that in many cases, the phishing actors host their credential stealing pages directly on the abused services, so they send an email to targets containing a URL leading to the page.

Loading a malicious document from a file hosting service (left), hosting a phishing site (right)

In other cases, however, the landing pages hosted on the abused services don't contain the credential-stealing forms themselves. Instead, they take the victim through one more redirection step to another site.

The phishing site can be hosted on a bulletproof service provider that doesn't respond to takedown requests, so the phishing actors follow that practice to increase campaign uptime while sacrificing the conversion rate.

Even if the phishing page isn't well protected, hiding it behind one more layer reduces the labor required to set everything up again in the case of a takedown.

"In the event that the final credential-stealing page is taken down, the attacker can simply change the link and point to a new credential-stealing page, preserving the effectiveness of the original campaign," reads the report.

 

Not going away anytime soon

Stopping the abuse of legitimate SaaS platforms will be very hard, as implementing aggressive email filters against those services isn't a choice.

That's precisely what makes them so suitable for phishing campaigns and why the rise in its abuse since last year has been so startling.

If a message that makes bold claims or requests urgent action from you lands in your inbox, avoid clicking embedded links or buttons, but instead use a search engine to locate the official site of the potentially spoofed platform.

Whenever you're requested to enter your account credentials, ensure that you are on the legitimate website URL before you start typing in the form boxes.

Related News

Why Zero Trust Should be the Foundation of Your Cybersecurity Ecosystem

26 Sep 2022

For cybersecurity professionals, it is a huge challenge to separate the "good guys" from the "villains". In the past, most cyberattacks could simply be traced to external cybercriminals, cyberterrorists, or rogue nation-states. But not anymore.

Read More

Microsoft: Iranian hackers encrypt Windows systems using BitLocker

19 Sep 2022

Microsoft says an Iranian state-sponsored threat group it tracks as DEV-0270 (aka Nemesis Kitten) has been abusing the BitLocker Windows feature in attacks to encrypt victims' systems.

Read More

CLOUD APPLICATIONS ARE THE MAJOR CATALYST FOR CYBER-ATTACKS: MICROSOFT

12 Sep 2022

At any point in time on any day of the week, Microsoft’s cloud computing operations are under cyber-attack: The company detects a whopping 1.5 million attempts a day to compromise its systems.

Read More