Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

The Picture in Picture Attack

June 2023 by Jeremy Fuchs, Cybersecurity Researcher/Analyst at Avanan, A Check Point Software Company

Successful hacks rarely spell out what’s about to happen. Instead, hackers rely on deceptive social engineering tactics. The idea is to get you to think you’re doing something legitimate but is, in fact, not.

One way to do that is through obfuscation. By hiding the true intent of the email, it may be more likely that a security scanner thinks it is clean, and that an end-user engages with it. One way to do that is to use something expected–like a picture–and hide the malicious stuff behind it. In this Attack Brief, Check Point Harmony Email researchers will discuss how hackers hide malicious links within pictures to redirect users to phishing sites.

Attack
In this attack, hackers create magic links that change into the intended destination upon pasting.
• Vector: Email
• Type: Malicious Link
• Techniques: Picture in Picture, Obfuscation
• Target: Any end-user

Email Example

This looks like a fairly standard email. It’s a fake message from Kohl’s, showing that the user has been chosen to participate in their free Loyalty Program. However, the URL has nothing to do with Kohl’s

Same thing here. It’s a relatively convincing-looking image of a Delta gift card offer. But again, the URL doesn’t point to Delta.

Both URLs are, in fact, somewhat similar.

When clicking on it, users are redirected to classic credential harvesting pages.

Behind the picture is where the URL lies. Even legitimate pictures from legitimate brands link to a page. Most marketing emails work that way. There will be a nice-looking promotion image, and the link goes to the intended page. Here, though, the intended page has nothing to do with Delta or Kohl’s and everything to do with stealing your information.

Techniques

Obfuscation is a gift to hackers. It allows them to pull off a magic trick. It works by hiding the true intent of their message. In this case, it’s a picture. The picture is meant to entice the user to click. Who wouldn’t want a $1,000 Delta Gift Card? They hope the user will be intrigued enough not to hover over the URL and see that it doesn’t match. An eagle-eyed user would see that and immediately know something is amiss. And they’re also hoping that the URL filters will be confused too. It’ll look clean if they aren’t scanning within the image. This is a fairly common method. Oftentimes, hackers will happily link a file or image, or QR code to something malicious. Only by using OCR to convert the images to text or parsing QR codes and decoding them can you see the true intention. But many security services don’t or can’t do this.

In this case, the email seems pretty legitimate. Yes, standard things like the sender’s address and the link are off. But it’s a reasonably convincing spoof of Delta and Kohl’s, which legitimizes this otherwise illegitimate act. That the URL is hidden behind the picture makes things much more challenging.

Best Practices: Guidance and Recommendations
To guard against these attacks, security professionals can do the following:

• Implement security that looks at all URLs and emulates the page behind it
• Leverage URL protection that uses phishing techniques like this one as an indicator of an attack
• Leverage AI-based, anti-phishing software capable of blocking phishing content across the entirety of the productivity suite.

Attack
In this attack, hackers are creating magic links that change into the intended destination upon pasting.
• Vector: Email
• Type: Malicious Link
• Techniques: Picture in Picture, Obfuscation
• Target: Any end-user

Email Example

This email looks like fairly standard fare. It’s a fake message from Kohl’s, showing that the user has been chosen to participate in their free Loyalty Program. However, the URL has nothing to do with Kohl’s

Same thing here. It’s a fairly convincing-looking image of a Delta gift card offer. But again, the URL doesn’t point to Delta.

Both URLs are, in fact, fairly similar.

When clicking on it, users are re-directed to classic credential harvesting pages.

Behind the picture is where the URL lies. This is not fairly uncommon. Even legitimate pictures, from legitimate brands, link to a page. Most marketing emails work that way. There will be a nice-looking image of a promotion, and the link goes to the intended page.

Here, though, the intended page has nothing to do with Delta or Kohl’s, and everything to do with stealing your information.

Techniques

Obfuscation is a gift to hackers. It gives them the ability to pull off a bit of a magic trick. It works by hiding the true intent of their message.

In this case, it’s a picture. The picture is meant to entice the user to click. Who wouldn’t want a $1,000 Delta Gift Card?

What they are hoping is that the user will be intrigued enough to not hover over the URL and see that it doesn’t match. An eagle-eyed user would see that and immediately know something is amiss.

And they’re also hoping that the URL filters will be confused too. If they aren’t scanning within the image, then it’ll look clean. In fact, this is a fairly common method. Oftentimes, hackers will happier link a file or image or QR code to something malicious. Only by using OCR to convert the images to text, or parsing QR codes and decoding them, can you see what the true intention is. But many security services don’t or can’t do this.

In this case, the email seems fairly legitimate. Yes, standard things like the sender address and the link are off. But it’s a fairly convincing spoof of Delta and Kohl’s, which lend legitimacy to this otherwise illegitimate act.

That the URL is hidden behind the picture makes things much tougher.

Best Practices: Guidance and Recommendations
To guard against these attacks, security professionals can do the following:
• Implement security that looks at all URLs and emulates the page behind it
• Leverage URL protection that uses phishing techniques like this one as an indicator of attack
• Leverage AI-based, anti-phishing software capable of blocking phishing content across the entirety of the productivity suite.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts