This phishing attack uses some very retro technology to hide its payload
You don’t see Morse code used much these days - until now
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
A newphishingattack has been discovered making use of a form of communication that is more commonly associated with 19th-century radio signals than modern cyberattacks: Morse code. The campaign uses Morse code to enable malicious login forms to escape detection by anti-phishing email software.
As with many phishing campaigns, this one starts with a spam email purportedly containing a payment invoice. Attached to the email is an HTML file that is designed to look like an Excel spreadsheet. Typically, the file ends: “_xlsx.html.”
When investigating this attachment further using a text editor, it becomes clear that it includes JavaScript entries that correlate letters and numbers to Morse code. The script then implements a decodeMorse() function to translate the Morse code into a hexadecimal string, and subsequently JavaScript tags, that are injected into the attached HTML page.
Credential theft
All of the aforementioned techniques are largely a way for the threat actors to evade detection. Once the injected scripts, including the Morse code, come together they launch a fake Excel spreadsheet that prompts the victim to enter their Office 365 credentials. This, of course, is simply a method for attackers to steal an individual’s username and password.
It appears that this campaign is a targeted one, with specific businesses being attacked.Bleeping Computerreports that firms including Dimensional, Capital Four, Dea Capital, and several others are among those to have been sent malicious emails associated with this particular phishing threat.
As email security tools become increasingly sophisticated at preventing phishing emails from being delivered, threat actors are responding with intricate ways of avoiding detection. It will be interesting to see whether this Morse code attempt gains traction among other cyberattackers.
ViaBleeping Computer
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Barclay has been writing about technology for a decade, starting out as a freelancer with ITProPortal covering everything from London’s start-up scene to comparisons of the best cloud storage services. After that, he spent some time as the managing editor of an online outlet focusing on cloud computing, furthering his interest in virtualization, Big Data, and the Internet of Things.
Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics
This new phishing strategy utilizes GitHub comments to distribute malware
Arcane season 2 finally gave us the huge Caitlyn and Vi moment we’ve been waiting for – and its creators say ‘we couldn’t have done it in season one’