Welcome back to the Threat Hunters Corner! I’m Josh Shepard, Principal Threat Hunter at Radical, and in this episode, we’ll diving into a recent phishing campaign we found during a threat hunt that makes use of an AI augmented app developer tool to create a captcha style page to help bypass automated spam filters.
Hello everyone, Josh Shepard here, Principal Threat Hunter at Radical. Welcome to this special edition of the Threat Hunter's Corner. Today, we’re diving into an intriguing phishing campaign we uncovered during a recent threat hunt. This campaign cleverly uses an AI-powered app builder to bypass automated Office 365 (O365) phishing filters.
The phishing attempt starts with a seemingly innocuous email, mimicking a common notification: "You have a voicemail. Click this link." When the unsuspecting user clicks the link, they are eventually redirected to an O365 credential-stealing page. However, the journey to this malicious page is what makes this campaign particularly interesting.
The campaign’s flow—from Lovable’s CAPTCHA to Cloudflare’s CAPTCHA, and finally to the fake login page—appears very convincing. However, the attackers have also implemented additional measures to evade detection and analysis.
One notable tactic is the use of debugger breakpoints within the malicious website. These breakpoints can detect when a threat analyst or security researcher opens developer tools to inspect network connections and data flows. If such an attempt is detected, the code redirects the user to a benign site, such as eBay, thereby thwarting the analysis.
This phishing campaign is a prime example of how threat actors continuously adapt and leverage new technologies to enhance their attack strategies. The use of AI-powered tools like Lovable to create CAPTCHA systems and the implementation of debugger breakpoints for defense evasion highlight the sophistication of modern phishing attempts.
As always, it’s crucial to stay vigilant and informed about the latest tactics used by cybercriminals. If you have any questions or need further insights, feel free to reach out. Stay safe, and we’ll see you in the next episode of the Threat Hunter's Corner.