BEC Attacks Evolving - Phishing via XPS Files

Blog

Thought Leadership

BEC Attacks Evolving - Phishing via XPS Files

David Pickett

We've seen it time after time, malicious actors routinely attempt to confuse recipients of messages with obscure or lesser-utilized file extensions.

Over the past month, some phishing attempts using xps files instead of the typical pdf or doc/docx formats have been captured by our filters.  The xps file format is Microsoft's alternative to pdf files.  Windows machines with Vista or later operating systems natively support this extension with Windows xps file viewer.  Actors have started taking advantage of this lesser-utilized format for their phishing campaigns.

 Phishing Examples

Our SecureTide email filtering has captured a wide range of these phishing messages.  So far, they appear to be attributed to threat actors currently conducting Business Email Compromise (BEC) attacks.  Attacks originate from legitimate (compromised) senders with the similar techniques, tactics, and procedures.  Below is an example which could easily dupe unsuspecting users.

XPS Phishing Example 2

Viewing the XPS File

Users should not open or view unsolicited attachments, even from a known sender without intense scrutiny and/or verification.  Scammers do exploit the trust that known contacts share.  Hopefully a user will never see one of these, however, this is what these attached files look like when opened in an isolated test environment.

Viewing XPS File


Linked Phishing Portals

If the user happens to click on the link in the attached xps file (pictured above), below is an example web phishing portal they might encounter.  For this particular one, the first screen requests their email address.  If they proceed with entering it, the next image shows the resulting page requesting their email credentials.

Phishing Portal 1

 After entering email address:

Phishing Portal 1 cont


Filter Evasion Techniques

Malicious actors are attempting to use filter evasion techniques.  They break up the suspicious phishing text via canvas clip mappings inside deeply embedded fpage files.  An image portion below displays how they used multiple canvas clip mappings to stitch together the words, "open with your professional email login credentials."

Canvas Map

  Minimal Anti-Virus Signatures for XPS Files

Most anti-virus engines do not have many phishing rules setup for the xps extensions like they would for more commonly used ones.  We can see this example received 0/60 hits when processed thru a popular anti-virus engine aggregator.

VirusTotal 0/60

  AppRiver Protection

There is no shortage of spam, malware, phishing, or nefarious websites AppRiver’s staff and systems continuously protect and defend against. Malicious actors work around the clock, therefore, we at AppRiver work even harder to stay one step ahead. Our team is here 24/7 365 days a year protecting and supporting clients and partners from security threats.

{{cta('8dddce58-7c8f-4e35-8895-353c48f9163a')}}

You May Also Like

https://blog.appriver.com/2018/02/office-365-business-email-compromise-attacks-proliferate/