Figure: Virus-Total detection for URL
The attackers carefully crafted the email and attachment to bypass detection and trick victims into interacting with the malicious content.
Figure: Malspam Email with PDF Attachment
Header Observations
RFC 5321, requires at least one recipient in the envelope of the email message, either in the To, Cc, or Bcc fields. SMTP itself does not enforce the presence of a visible To field in the email header, as long as the recipient is specified in the SMTP envelope during transmission.
PDF Attachment
The attached PDF file is disguised as an official DocuSign document, complete with branding and calls to action. It plays a critical role in luring the victim into clicking the embedded link.
Threat actors performed basic mistakes while mimicking DocuSign integration. As per DocuSign’s Incident-Reporting portal:
Once the victim interacts with the PDF, the campaign shifts into its second phase: a series of redirections designed to maintain credibility and evade detection.
Figure : Multi Direct Phishing Chain
Stage 1: hsForms Redirection
The PDF link directs victims to a hsForms-hosted page. This page, designed to mimic a DocuSign e-signature request, capitalizes on the trust associated with hsForms legitimate domain.
From hsForms, victims are led to another link embedded in the fake e-signature page. This obfuscates the true intent of the attack, delaying suspicion.
Stage 2: Final Phishing Page
The final phishing page includes a captcha challenge to create an illusion of authenticity and block automated analysis. Once the captcha is solved, victims are prompted to enter their corporate g-suite credentials, enabling the attackers to harvest sensitive information.
Figure: NACETM semantic based approach
This email was flagged as malicious by InceptionCyber’s Neural Analysis and Correlation Engine (NACETM). The semantic and thematic analysis aided to identify the intent of an email. Contextual relationship between the features from email headers, file attachments aided to classify the email as a Phishing attempt.
Header and Subject Features
The analysis of the SMTP features extracted following features from email:
Attachment Features
The single-page PDF attachment triggered several critical features for correlation, including:
The comprehensive feature extraction and the contextual relationships between intent, SMTP headers, and file attributes enabled NACE to classify the attachment as phishing without relying on the landing phishing URL. The approach taken by NACE differs from traditional technologies that rely on payload inspection or final landing URL analysis for decision-making
At the time of writing, none (0 out of 96) of the Anti-Virus vendors classifying this URL as phishing.
Figure: Virus-Total detection for URL
This campaign demonstrates a sophisticated approach by blending social engineering with the abuse of legitimate platforms. Key observations include:
This DocuSign-themed phishing campaign underscores the increasing sophistication of attackers in abusing legitimate services to bypass security measures. By creating a convincing facade, leveraging free-form service platforms, and employing multi-step redirections, the attackers effectively exploited corporate users' trust.
Traditional technologies like signature-based detection, sandboxing, and machine learning/deep learning rely on examining malicious payloads, which often remain hidden during analysis due to evasion techniques. This allows multi-stage, evasive, AI or threat actor generated malicious attachments and call-to-action URLs to reach endpoints.
NACE, employs advanced semantic and thematic analysis to comprehend intent, and leverages the contextual relationships between intent, SMTP headers, and auxiliary features to classify URLs and attachments as malicious or benign. This advancement moves far beyond traditional reliance on malicious indicators generated by threat actors or AI, to stop the evasive threats that other technologies simply can’t identify.