Security

Research

Mind your header! There's nothing refreshing about phishers' latest tactic

It could lead to a costly BEC situation


Palo Alto's Unit 42 threat intel team wants to draw the security industry's attention to an increasingly common tactic used by phishers to harvest victims' credentials.

The infocseccers say they'd spotted miscreants abusing refresh entries in HTTP headers to the tune of circa 2,000 large-scale phishing campaigns between May and July this year, although the practice has been observed throughout the year.

Embedding malicious URLs in a web page's response header, in this case, means visitors to the web pages are automatically redirected to malicious ones. Once this is accomplished, attackers will typically spoof the login pages of well-known vendors to steal the user's passwords.

The attack starts out like any other phishing-based incident. An email is sent to a target containing a link that typically mimics a legitimate or compromised domain, making the job of spotting one more difficult.

Should a user click that link (failure number one), they'll be directed to one page which the attacker has already instructed to redirect to another after a period of, say, a few seconds – although it could be done immediately too.

Because the refresh field was populated with the code that redirects visitors to alternative URLs, this process is not only executed automatically against the user's will, but also before the initial web page is even loaded, since the response header is handled before HTML content loads.

"The original and landing URLs are often found under legitimate or compromised domains and hosts, a technique that's often effective in concealing malicious URL strings," said Unit 42's Yu Zhang, Zeyu You, and Wei Wang in a statement.

"Additionally, attackers frequently use legitimate domains that offer URL shortening, tracking, or campaign marketing services."

By adding deep linking into the fray, the criminals allow the malicious form to partially pre-load with the user's details, and taken together, these tactics tee up an attack for greater success, the researchers believe.

Of course, this needs to be packaged up into a convincing initial email, which – if one examines some of the examples Unit 42 used in their writeups – aren't too common here. You'd expect an organization's email provider to push emails with three successive exclamation marks straight into the spam folder, for example. Yet apparently that's not always the case!!!

(Some of the other examples Unit 42 used in its report appeared to be more professionally composed.)

Organizations in the business and economy sector are most likely to be targeted, with 36.2 percent of all attempts focusing on this corner of industry, according to the report. 

Unit 42's catch-all "Other Industries" category came in second with 32.9 percent of these attempts and financial services was next with a 12.9 percent share of the attacks. Government, healthcare, and tech came in behind them, each with small shares.

"In our research, we found no legitimate websites exhibiting this behavior," the report says. "Although the refresh header can be useful in specific situations like dynamically updating websites, we more commonly see other methods such as JavaScript-based techniques or server-side push technologies like WebSockets.

"Ultimately, organizations should be more aware of the potential for malicious use of HTTP refresh headers."

According to the FBI's Internet Crime Complaint Center's (IC3) most recent annual report [PDF], phishing remains the most common form of cybercrime by a huge distance, despite some slight, consistent decline since 2021 with roughly 300,000 cases reported last year. That's just in the US and only the ones people spotted and bothered to report.

Phishing is often used in business email compromise (BEC) schemes, which according to that same FBI report led to annual losses exceeding $2.9 billion in 2023.

With money like that on the line and the clear potential for success criminals have with phishing, it's no wonder they'll adopt increasingly sophisticated tricks to keep deceiving end users. ®

Send us news
2 Comments

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren't; Polish spy boss arrested, and more

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence