SlideShare a Scribd company logo
Phishing in
the cloud era
Ashwin Vamshi &
Abhinav Singh
❖ Staff Security Research Engineer,
Netskope
➢ Innate interest in targeted attacks and
malwares using cloud services.
➢ Identifying malwares, campaigns and threat
actors using ‘cloud as an attack vector’
Ashwin Vamshi
2
Abhinav Singh
❖ Staff Security Research Engineer, Netskope
➢ Background in Malware research, reverse engineering,
incident response and cloud security.
➢ Author and speaker.
3
Agenda
4
Introduction
Cloud abuse
techniques and
case-studies
Motivation behind
abusing cloud
Conclusion
Cloud Adoption Trend
5
Attacks “at the scale of cloud”
• Wide-scale adoption of cloud services by cybercriminals with a large
upscale around phishing attacks.
• The phished baits are designed to mimic login pages of popular cloud
services
• Phishing attacks hosted in the cloud are highly effective and hard to
detect.
• Example - Phishing website with a Microsoft domain and a Microsoft-
issued SSL certificate, asking for Office 365 credentials.
6
7
BEC- It Still Exists!!
Source: Fincen.gov
BEC in the cloud era - Problem
statement
• Attacks with SSL certificates/Cloud services to
appear legitimate.
• Tricks corporate users that are savvy enough
to check that the domain and SSL certificate
of a website is from a trusted origin.
• Slow take-downs, fast recovery.
8
1. PhaaS - Phishing as a Service
Cloud Abuse techniques
PhaaS - Attack Description
• Cloud hosted Phishing-as-a-Service cyber-crime model.
• Click, Build & Host.
• Flexible plans with wide variety of payment options being
accepted.
• Additional features like user training, 24/7 customer
support and remote monitoring.
10
Hackshit – Case-study
11
Hackshit – Infection Monitoring Page
12
• The phished baits were served with SSL
certificates signed by LetsEncrypt or Comodo.
• TLD’s: “moe”, “tn”, “cat”, “wtf”, and “space”.
• Websites were built using a file uploading and
sharing platform named Pomf.
• Pomf clones not indexed by search engines.
Hackshit – Source Code View
13
Hackshit - Pointers
• Recorded the victims credentials via websocket
service hosted in the cloud.
• Shift of service: Amazon > Evennode > Now.
• Takedowns → resurface and reuse attack elements.
• Classic example of reusing the same attack elements
onto new cloud accounts.
14
15
2. Phishing Attacks Hosted via Public Cloud
16
Abusing popular cloud SaaS, IaaS applications like Google
Drive, Dropbox, OneDrive, Azuresites, Googlesites etc.
Infection vector Email attachment → Decoy documents
Specifically targets corporate users using cloud
applications.
17
Malicious PDF Attachments – Case-study
Phish → Microsoft-issued SSL certificate &
Microsoft-owned domain
18
Phishing webpage hosted in Azure blob storage
19
3. Cloud Fan-out
Effect
• Infection spreading through the default Sync-&-
Share property of SaaS services.
• Use of collaboration tools that automatically sync
email attachments to SaaS apps.
• Self inflicted propagation of malicious file across
the peer network.
• Even if unsuccessful- may leave the target
vulnerable to future attacks. (Default Allow Policy)
20
CloudPhishing Fan-out – Case Study
A victim inadvertently shares the phishing
document with colleagues, whether
internal or external, via a cloud service.
Secondary propagation vector.
Shared users lose the context of the document’s external origin and may trust the
internally shared document as if it were created internally.
CloudPhishing Fan Out- Case Study
22
Document Decoys - Default Allow Policy
&
Annotations
Attack Description - Default Allow Policy
24
ABUSES THE “DEFAULT ALLOW” POLICY
FOR POPULAR PDF READERS.
WARNING FROM PDF VIEWING
APPLICATION POINTING TO AN
EXTERNAL LINK CONNECTING TO THE
CLOUD APPLICATION. FOR LEGITIMATE
REASONS.
THE NORTH ALWAYS “REMEMBERS”
Case Study - Zoom Zoom!!
25
Case Study II – PDF Annotations
26
Attack Description - PDF
Annotations
27
Indicates that the attackers plan to reuse the decoy template
by appending new links when the URL is taken down.
Annotations mostly carried out using RAD PDF annotator by
threat actors.
Attack campaign artifacts are simply being reused by the
malware author to rapidly adapt to malicious file takedowns.
Targeted attacks abusing Google
Cloud Platform Open Redirection
Attack Description
• Phishing email containing PDF decoy
document which points to Google
app engine.
• Abuses Google Cloud app engine’s
open redirection to deliver malware.
• A design weakness that allows
the attacker to construct a
redirection chain.
• The URL redirection case falls
under the category of
Unvalidated Redirects and
Forwards as per OWASP.
29
GCP Open redirection chain
The user is logged out from appengine.google.com
and a response status code ‘302’ is generated for
URL redirection.
– As this action gets executed, the user is in
turn redirected to google.com/url using the
query “?continue=”.
– Using this redirection logic, the destination
landing page is reached.
• These Themed decoys primarily targeted
governments, banking and financial firms
worldwide via phishing emails sent by the
attackers posing as legitimate customers of
those institutions.
Motivation
behind
abusing
cloud
services
31
Ease of use and abuse.
Reduces the infrastructure overhead.
Way more powerful than traditional hosting or
computing services.
Significantly cheaper than traditional attack
methods (No DGA or BPH needed).
Gives attackers protection by default (encrypted
traffic, API driven communication etc).
Conclusion
32
Cloud adoption helps organizations in
improving their IT infrastructure and control
cost.
Its rapid adoption has also caught the
attention of cyber criminals who are
financially motivated.
Cloud Solution Providers (CSP) have adopted
the concept of shared responsibility model for
securing the workloads.
Organizations should carefully assess the risks
and potential threats when moving towards
the cloud.
https://www.netskope.com/resources/netskope-threat-research-labs
33
Thankyou!!
Netskope Threat Research Labs

More Related Content

PDF
Phishing in the Cloud Era (BSides)
PPTX
Defcon 27 - The Future of Command and Control
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PPTX
5 Highest-Impact CASB Use Cases
PPTX
Defcon 27 - Exploiting IAM in GCP
PDF
Phishing in the cloud era
PPTX
Lacework AWS Security Week Presentation
PDF
Lacework slides from AWS Meetups
Phishing in the Cloud Era (BSides)
Defcon 27 - The Future of Command and Control
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases
Defcon 27 - Exploiting IAM in GCP
Phishing in the cloud era
Lacework AWS Security Week Presentation
Lacework slides from AWS Meetups

What's hot (20)

PDF
MozDef Workshop slide
PDF
(SACON) Anant Shrivastava - cloud pentesting
PDF
Mining Malevolence: Cryptominers in the Cloud
PPTX
Lacework for AWS Security Overview
PPTX
Lacework Overview: Security Redefined for Cloud Scale
PDF
Stop Hackers with Integrated CASB & IDaaS Security
PDF
Cybersecurity-Serverless-Graph DB
PPT
From The Hidden Internet: Lesson From 12 Months Of Monitoring
PDF
Securing aws workloads with embedded application security
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
Application layer attack trends through the lens of Cloudflare data
PDF
PIE - BSides Vancouver 2018
PDF
Phishing Intelligence Engine - BlueHat v17
PDF
Cloud Access Security Brokers - What's all the Hype
PDF
Realities of Security in the Cloud
PPTX
Security O365 Using AI-based Advanced Threat Protection
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PPTX
Cloud Crime Ops
MozDef Workshop slide
(SACON) Anant Shrivastava - cloud pentesting
Mining Malevolence: Cryptominers in the Cloud
Lacework for AWS Security Overview
Lacework Overview: Security Redefined for Cloud Scale
Stop Hackers with Integrated CASB & IDaaS Security
Cybersecurity-Serverless-Graph DB
From The Hidden Internet: Lesson From 12 Months Of Monitoring
Securing aws workloads with embedded application security
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
#ALSummit: Realities of Security in the Cloud
Application layer attack trends through the lens of Cloudflare data
PIE - BSides Vancouver 2018
Phishing Intelligence Engine - BlueHat v17
Cloud Access Security Brokers - What's all the Hype
Realities of Security in the Cloud
Security O365 Using AI-based Advanced Threat Protection
#ALSummit: Alert Logic & AWS - AWS Security Services
Cloud Crime Ops
Ad

Similar to Defcon 27 - Phishing in the Cloud Era (20)

PPTX
Netskope Threat Labs: Cloud As an Attack Vector
PDF
MalCon Future of Security
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PDF
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
PDF
Presd1 10
PPTX
Top Application Security Trends of 2012
PPTX
Breakfast Briefings - February 2018
PDF
Security in the cloud protecting your cloud apps
PPTX
CloudPassage Overview
PDF
DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
DOCX
Cloud Computing Security
PDF
Top 10 Threats to Cloud Security
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Seclud it polesc_sjuly7
PDF
Ciphercloud Solutions Overview hsa oct2011
PDF
Threats, Threat Modeling and Analysis
PDF
Anatomy of a Cloud Hack
PDF
Cloud servers-new-risk-considerations
PDF
CLOUD & ETHICAL HACKING INTRODUCTION PDF
PPTX
cloudComputingSec_p3.pptx
Netskope Threat Labs: Cloud As an Attack Vector
MalCon Future of Security
Web App Security Presentation by Ryan Holland - 05-31-2017
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Presd1 10
Top Application Security Trends of 2012
Breakfast Briefings - February 2018
Security in the cloud protecting your cloud apps
CloudPassage Overview
DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
Cloud Computing Security
Top 10 Threats to Cloud Security
CyberCrime in the Cloud and How to defend Yourself
Seclud it polesc_sjuly7
Ciphercloud Solutions Overview hsa oct2011
Threats, Threat Modeling and Analysis
Anatomy of a Cloud Hack
Cloud servers-new-risk-considerations
CLOUD & ETHICAL HACKING INTRODUCTION PDF
cloudComputingSec_p3.pptx
Ad

More from Netskope (20)

PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PPTX
DEF CON 27 - Exploiting AWS Loopholes
PPTX
The Definitive CASB Business Case Kit - Presentation
PDF
June 2016 EMEA Netskope Cloud Report
PDF
June 2016 Worldwide Netskope Cloud Report
PPTX
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
PPTX
Quantifying Cloud Risk for Your Corporate Leadership
PPTX
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
PDF
Autumn 2015 EMEA Netskope Cloud Report
PDF
Fall 2015 Worldwide Netskope Cloud Report
PPTX
Cloud Security for Dummies Webinar — The Identity Edition
PPTX
Reference Architecture for Data Loss Prevention in the Cloud
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PDF
Summer 2015 EMEA Netskope Cloud Report
PDF
Summer 2015 Worldwide Netskope Cloud Report
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PDF
Netskope Overview
PPTX
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
PPTX
Data Breach: The Cloud Multiplier Effect
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
DEF CON 27 - Exploiting AWS Loopholes
The Definitive CASB Business Case Kit - Presentation
June 2016 EMEA Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Quantifying Cloud Risk for Your Corporate Leadership
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Autumn 2015 EMEA Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
Cloud Security for Dummies Webinar — The Identity Edition
Reference Architecture for Data Loss Prevention in the Cloud
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
Making Cloud Security Part of Your DNA Webinar Slides
Netskope Overview
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Breach: The Cloud Multiplier Effect

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf

Defcon 27 - Phishing in the Cloud Era

  • 1. Phishing in the cloud era Ashwin Vamshi & Abhinav Singh
  • 2. ❖ Staff Security Research Engineer, Netskope ➢ Innate interest in targeted attacks and malwares using cloud services. ➢ Identifying malwares, campaigns and threat actors using ‘cloud as an attack vector’ Ashwin Vamshi 2
  • 3. Abhinav Singh ❖ Staff Security Research Engineer, Netskope ➢ Background in Malware research, reverse engineering, incident response and cloud security. ➢ Author and speaker. 3
  • 6. Attacks “at the scale of cloud” • Wide-scale adoption of cloud services by cybercriminals with a large upscale around phishing attacks. • The phished baits are designed to mimic login pages of popular cloud services • Phishing attacks hosted in the cloud are highly effective and hard to detect. • Example - Phishing website with a Microsoft domain and a Microsoft- issued SSL certificate, asking for Office 365 credentials. 6
  • 7. 7 BEC- It Still Exists!! Source: Fincen.gov
  • 8. BEC in the cloud era - Problem statement • Attacks with SSL certificates/Cloud services to appear legitimate. • Tricks corporate users that are savvy enough to check that the domain and SSL certificate of a website is from a trusted origin. • Slow take-downs, fast recovery. 8
  • 9. 1. PhaaS - Phishing as a Service Cloud Abuse techniques
  • 10. PhaaS - Attack Description • Cloud hosted Phishing-as-a-Service cyber-crime model. • Click, Build & Host. • Flexible plans with wide variety of payment options being accepted. • Additional features like user training, 24/7 customer support and remote monitoring. 10
  • 12. Hackshit – Infection Monitoring Page 12 • The phished baits were served with SSL certificates signed by LetsEncrypt or Comodo. • TLD’s: “moe”, “tn”, “cat”, “wtf”, and “space”. • Websites were built using a file uploading and sharing platform named Pomf. • Pomf clones not indexed by search engines.
  • 13. Hackshit – Source Code View 13
  • 14. Hackshit - Pointers • Recorded the victims credentials via websocket service hosted in the cloud. • Shift of service: Amazon > Evennode > Now. • Takedowns → resurface and reuse attack elements. • Classic example of reusing the same attack elements onto new cloud accounts. 14
  • 15. 15
  • 16. 2. Phishing Attacks Hosted via Public Cloud 16 Abusing popular cloud SaaS, IaaS applications like Google Drive, Dropbox, OneDrive, Azuresites, Googlesites etc. Infection vector Email attachment → Decoy documents Specifically targets corporate users using cloud applications.
  • 18. Phish → Microsoft-issued SSL certificate & Microsoft-owned domain 18
  • 19. Phishing webpage hosted in Azure blob storage 19
  • 20. 3. Cloud Fan-out Effect • Infection spreading through the default Sync-&- Share property of SaaS services. • Use of collaboration tools that automatically sync email attachments to SaaS apps. • Self inflicted propagation of malicious file across the peer network. • Even if unsuccessful- may leave the target vulnerable to future attacks. (Default Allow Policy) 20
  • 21. CloudPhishing Fan-out – Case Study A victim inadvertently shares the phishing document with colleagues, whether internal or external, via a cloud service. Secondary propagation vector. Shared users lose the context of the document’s external origin and may trust the internally shared document as if it were created internally.
  • 22. CloudPhishing Fan Out- Case Study 22
  • 23. Document Decoys - Default Allow Policy & Annotations
  • 24. Attack Description - Default Allow Policy 24 ABUSES THE “DEFAULT ALLOW” POLICY FOR POPULAR PDF READERS. WARNING FROM PDF VIEWING APPLICATION POINTING TO AN EXTERNAL LINK CONNECTING TO THE CLOUD APPLICATION. FOR LEGITIMATE REASONS. THE NORTH ALWAYS “REMEMBERS”
  • 25. Case Study - Zoom Zoom!! 25
  • 26. Case Study II – PDF Annotations 26
  • 27. Attack Description - PDF Annotations 27 Indicates that the attackers plan to reuse the decoy template by appending new links when the URL is taken down. Annotations mostly carried out using RAD PDF annotator by threat actors. Attack campaign artifacts are simply being reused by the malware author to rapidly adapt to malicious file takedowns.
  • 28. Targeted attacks abusing Google Cloud Platform Open Redirection
  • 29. Attack Description • Phishing email containing PDF decoy document which points to Google app engine. • Abuses Google Cloud app engine’s open redirection to deliver malware. • A design weakness that allows the attacker to construct a redirection chain. • The URL redirection case falls under the category of Unvalidated Redirects and Forwards as per OWASP. 29
  • 30. GCP Open redirection chain The user is logged out from appengine.google.com and a response status code ‘302’ is generated for URL redirection. – As this action gets executed, the user is in turn redirected to google.com/url using the query “?continue=”. – Using this redirection logic, the destination landing page is reached. • These Themed decoys primarily targeted governments, banking and financial firms worldwide via phishing emails sent by the attackers posing as legitimate customers of those institutions.
  • 31. Motivation behind abusing cloud services 31 Ease of use and abuse. Reduces the infrastructure overhead. Way more powerful than traditional hosting or computing services. Significantly cheaper than traditional attack methods (No DGA or BPH needed). Gives attackers protection by default (encrypted traffic, API driven communication etc).
  • 32. Conclusion 32 Cloud adoption helps organizations in improving their IT infrastructure and control cost. Its rapid adoption has also caught the attention of cyber criminals who are financially motivated. Cloud Solution Providers (CSP) have adopted the concept of shared responsibility model for securing the workloads. Organizations should carefully assess the risks and potential threats when moving towards the cloud.