Phishing-as-a-Service through Telegram bot (2024)

  • phishing

Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.

  • Alanna Titterington

Phishing-as-a-Service through Telegram bot (3)

Researchers have discovered a phishing marketplace called ONNX Store, which gives cybercriminals access to tools for hijacking Microsoft 365 accounts, including a means for bypassing two-factor authentication (2FA). This enables threat actors to crank out phishing attacks on both Microsoft 365 and Office 365 email accounts. Corporate information security teams should be aware of this threat and tool up with anti-phishing protection. Let’s take a closer look at the danger…

A malicious attachment with a QR code and 2FA bypass

The researchers’ report describes an attack using ONNX Store phishing tools that targets employees of several financial institutions. First, the victims receive emails seemingly from their HR departments on the topic of remuneration as bait.

The emails contain PDF attachments containing a QR code to be scanned in order to gain access to a “secure document” with “vital information” about the recipient’s salary. The idea here is to get the victim to open the link not on a work computer — which most likely has anti-phishing protection, but on a personal smartphone — which may well not.

The link opens a phishing site mimicking a Microsoft 365 login page. Here, the victim is asked to enter their username and password, followed by a one-time 2FA code.

Phishing-as-a-Service through Telegram bot (4)

The fake Microsoft login page prompts victims to enter their credentials and a one-time 2FA code. Source

All of this information of course goes straight to the attackers. One-time 2FA codes usually have a very short lifespan — often just 30 seconds. Therefore, to speed up delivery of information, the phishing kit uses the WebSocket protocol, which provides real-time communication.

Armed with the stolen credentials and still-valid code, the attackers immediately log in to the account and gain full access to the victim’s correspondence. This access can then be exploited for business email compromise (BEC) and other attacks.

Phishing-as-a-service: plenty of phish in the sea

The hub of this phishing operation is the Telegram instant messenger. ONNX Store embraces automation to the fullest — all interaction with users is through Telegram bots.

Its creators provide phishing services on a subscription basis. The prices are quite low: for example, a monthly subscription for harvesting Microsoft 365 account passwords would cost a potential attacker $200 without a 2FA bypass — $400 with it.

Even small-time cybercriminals can afford that. For this modest investment, they get access to a set of finely-tuned phishing tools. All they have to do is to select an attackable target and devise a monetization scheme.

How to protect your organization against advanced phishing

It’s the low-entry threshold that makes the phishing-as-a-service model such a threat: the circle of cybercriminals with dangerous tools at their disposal becomes much wider. Therefore, we strongly advise that you take preemptive measures against an advanced phishing attack on your organization. Here’s what we recommend:

  • Consider using FIDO U2F hardware tokens (also known as YubiKeys) or passkeys for 2FA. These tools negate even the most sophisticated covert phishing attacks.
  • Deploy a reliable security solution with anti-phishing protection on all corporate devices, including smartphones and tablets.
  • Conduct regular security-awareness training to train employees to recognize and deal with suspicious emails. Our interactive Kaspersky Automated Security Awareness Platform provides everything you need on this and more.
  • Read next

How to stop being tracked via Bluetooth beacons like AirTag

Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.

Tips
  • Tips

How to guard against Windows downgrade attacks

Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?

  • Tips

How to travel safely

Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.

  • Tips

How the adversary-in-the-middle technique is used in spearphishing attacks

Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?

  • Tips

Fake Wi-Fi on board a flight

Even at cruising altitude, cyberthreats can still ground your digital life — as proven by a recent arrest. How to protect yourself at 30,000 feet above sea level?

Sign up to receive our headlines in your inbox
Phishing-as-a-Service through Telegram bot (2024)
Top Articles
Dnepropetrovsk Maniacs (Hammer Brothers) - This is the TRUE STORY | Horror Galore
Lockheed P-3 Orion - Seeaufklärer und U-Boot-Jagdflugzeug
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
Napa Autocare Locator
Dollywood's Smoky Mountain Christmas - Pigeon Forge, TN
Katmoie
Tj Nails Victoria Tx
Southeast Iowa Buy Sell Trade
Tx Rrc Drilling Permit Query
Elden Ring Dex/Int Build
Myunlb
[2024] How to watch Sound of Freedom on Hulu
Lesson 2 Homework 4.1
Dusk
New Mexico Craigslist Cars And Trucks - By Owner
Voyeuragency
Pwc Transparency Report
MindWare : Customer Reviews : Hocus Pocus Magic Show Kit
Tcgplayer Store
Viprow Golf
Google Flights Missoula
Equibase | International Results
Shadbase Get Out Of Jail
Foolproof Module 6 Test Answers
Craigslist Fort Smith Ar Personals
1636 Pokemon Fire Red U Squirrels Download
Restored Republic
How rich were the McCallisters in 'Home Alone'? Family's income unveiled
My Dog Ate A 5Mg Flexeril
Chadrad Swap Shop
Boneyard Barbers
Gina's Pizza Port Charlotte Fl
Trivago Myrtle Beach Hotels
T&Cs | Hollywood Bowl
Gateway Bible Passage Lookup
Academy Sports New Bern Nc Coupons
Cnp Tx Venmo
If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
Shoecarnival Com Careers
Saline Inmate Roster
Tattoo Shops In Ocean City Nj
Poe Self Chill
2Nd Corinthians 5 Nlt
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
Yale College Confidential 2027
Funkin' on the Heights
Race Deepwoken
Kushfly Promo Code
300+ Unique Hair Salon Names 2024
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Black Adam Showtimes Near Kerasotes Showplace 14
Nfhs Network On Direct Tv
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6315

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.