These Phishing Attacks Went Old School, Used Morse Code to Bypass Security

SOS the International Morse Code distress signal written on a blackboard
Stephen Rees/Shutterstock.com

Phishing attacks are ever-evolving and becoming more sophisticated. The latest, which targeted usernames and passwords, chose to go old school and use morse code to steer clear of email filter systems and other security measures.

Microsoft recently revealed the phishing attack, which it said used a “jigsaw puzzle” technique in addition to measures like Morse code and other encryption methods to obscure its attacks and avoid detection. The attacker group used invoices in Excel HTML or web documents as a means to distribute forms that snagged credentials for future breach attempts.

In a recent blog post, Microsoft Security Intelligence stated, “The HTML attachment is divided into several segments, including the JavaScript files used to steal passwords, which are then encoded using various mechanisms. These attackers moved from using plaintext HTML code to employing multiple encoding techniques, including old and unusual encryption methods like Morse code, to hide these attack segments.”

“In effect, the attachment is comparable to a jigsaw puzzle: on their own, the individual segments of the HTML file may appear harmless at the code level and may thus slip past conventional security solutions. Only when these segments are put together and properly decoded does the malicious intent show,” the blog post added.

Dangerous hooded hacker breaks into data server
Gorodenkoff/Shutterstock.com

Microsoft has spent over a year investigating this XLS.HTML phishing campaign. The attackers changed their obfuscation and encryption mechanisms roughly every 37 days, proving their skill and high motivation to keep the operation up and running while remaining undetected.

“In the February iteration, links to the JavaScript files were encoded using ASCII then in Morse code. Meanwhile in May, the domain name of the phishing kit URL was encoded in Escape before the entire HTML code was encoded using Morse code.”

While the primary aim of the phishing attack was to collect user login credentials, it also readily collected profit data—like user locations and IP addresses—which it likely planned to use in future attacks. Microsoft claimed that “This phishing campaign is unique in the lengths attackers take to encode the HTML file to bypass security controls.”

“The XLS.HTML phishing campaign uses social engineering to craft emails mimicking regular financial-related business transactions, specifically sending what seems to be vendor payment advice.” The campaign falls under the “business email compromise” category of attacks, a more lucrative scam than ransomware.

By using less-flashy methods, like Excel spreadsheet attachments, and then redirecting users to a fake Microsoft Office 365 credentials login page featuring their company’s logo (for example), many users are less likely to raise a red flag on the attack and enter their credentials.

Feel free to check out Microsoft’s blog post for a more in-depth look at the attack, including the timeline of how the encoding techniques changed from month to month.

via ZDNet

Suzanne Humphries Suzanne Humphries
Suzanne Humphries is the Commerce Editor for Review Geek. She has over six years of experience across multiple publications researching and testing products, as well as writing and editing news, reviews, and how-to articles covering software, hardware, entertainment, networking, electronics, gaming, apps, security, finance, and small business. Read Full Bio »

The above article may contain affiliate links, which help support Review Geek.