Skip to content

Commit 4d1bf33

Browse files
authored
Merge pull request HackTricks-wiki#1214 from HackTricks-wiki/update_2025_Unit_42_Global_Incident_Response_Report__Soci_20250730_124205
2025 Unit 42 Global Incident Response Report Social Engineer...
2 parents df3435f + a1663bb commit 4d1bf33

File tree

1 file changed

+92
-0
lines changed
  • src/generic-methodologies-and-resources/phishing-methodology

1 file changed

+92
-0
lines changed

‎src/generic-methodologies-and-resources/phishing-methodology/README.md‎

Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -462,6 +462,97 @@ You can **buy a domain with a very similar name** to the victims domain **and/or
462462

463463
Use [**Phishious** ](https://github.com/Rices/Phishious)to evaluate if your email is going to end in the spam folder or if it's going to be blocked or successful.
464464

465+
## High-Touch Identity Compromise (Help-Desk MFA Reset)
466+
467+
Modern intrusion sets increasingly skip email lures entirely and **directly target the service-desk / identity-recovery workflow** to defeat MFA. The attack is fully "living-off-the-land": once the operator owns valid credentials they pivot with built-in admin tooling – no malware is required.
468+
469+
### Attack flow
470+
1. Recon the victim
471+
* Harvest personal & corporate details from LinkedIn, data breaches, public GitHub, etc.
472+
* Identify high-value identities (executives, IT, finance) and enumerate the **exact help-desk process** for password / MFA reset.
473+
2. Real-time social engineering
474+
* Phone, Teams or chat the help-desk while impersonating the target (often with **spoofed caller-ID** or **cloned voice**).
475+
* Provide the previously-collected PII to pass knowledge-based verification.
476+
* Convince the agent to **reset the MFA secret** or perform a **SIM-swap** on a registered mobile number.
477+
3. Immediate post-access actions (≤60 min in real cases)
478+
* Establish a foothold through any web SSO portal.
479+
* Enumerate AD / AzureAD with built-ins (no binaries dropped):
480+
```powershell
481+
# list directory groups & privileged roles
482+
Get-ADGroup -Filter * -Properties Members | ?{$_.Members -match $env:USERNAME}
483+
484+
# AzureAD / Graph – list directory roles
485+
Get-MgDirectoryRole | ft DisplayName,Id
486+
487+
# Enumerate devices the account can login to
488+
Get-MgUserRegisteredDevice -UserId <user@corp.local>
489+
```
490+
* Lateral movement with **WMI**, **PsExec**, or legitimate **RMM** agents already whitelisted in the environment.
491+
492+
### Detection & Mitigation
493+
* Treat help-desk identity recovery as a **privileged operation** – require step-up auth & manager approval.
494+
* Deploy **Identity Threat Detection & Response (ITDR)** / **UEBA** rules that alert on:
495+
* MFA method changed + authentication from new device / geo.
496+
* Immediate elevation of the same principal (user-→-admin).
497+
* Record help-desk calls and enforce a **call-back to an already-registered number** before any reset.
498+
* Implement **Just-In-Time (JIT) / Privileged Access** so newly reset accounts do **not** automatically inherit high-privilege tokens.
499+
500+
---
501+
502+
## At-Scale Deception – SEO Poisoning & “ClickFix” Campaigns
503+
Commodity crews offset the cost of high-touch ops with mass attacks that turn **search engines & ad networks into the delivery channel**.
504+
505+
1. **SEO poisoning / malvertising** pushes a fake result such as `chromium-update[.]site` to the top search ads.
506+
2. Victim downloads a small **first-stage loader** (often JS/HTA/ISO). Examples seen by Unit 42:
507+
* `RedLine stealer`
508+
* `Lumma stealer`
509+
* `Lampion Trojan`
510+
3. Loader exfiltrates browser cookies + credential DBs, then pulls a **silent loader** which decides – *in realtime* – whether to deploy:
511+
* RAT (e.g. AsyncRAT, RustDesk)
512+
* ransomware / wiper
513+
* persistence component (registry Run key + scheduled task)
514+
515+
### Hardening tips
516+
* Block newly-registered domains & enforce **Advanced DNS / URL Filtering** on *search-ads* as well as e-mail.
517+
* Restrict software installation to signed MSI / Store packages, deny `HTA`, `ISO`, `VBS` execution by policy.
518+
* Monitor for child processes of browsers opening installers:
519+
```yaml
520+
- parent_image: /Program Files/Google/Chrome/*
521+
and child_image: *\\*.exe
522+
```
523+
* Hunt for LOLBins frequently abused by first-stage loaders (e.g. `regsvr32`, `curl`, `mshta`).
524+
525+
---
526+
527+
## AI-Enhanced Phishing Operations
528+
Attackers now chain **LLM & voice-clone APIs** for fully personalised lures and real-time interaction.
529+
530+
| Layer | Example use by threat actor |
531+
|-------|-----------------------------|
532+
|Automation|Generate & send >100 k emails / SMS with randomised wording & tracking links.|
533+
|Generative AI|Produce *one-off* emails referencing public M&A, inside jokes from social media; deep-fake CEO voice in callback scam.|
534+
|Agentic AI|Autonomously register domains, scrape open-source intel, craft next-stage mails when a victim clicks but doesn’t submit creds.|
535+
536+
**Defence:**
537+
• Add **dynamic banners** highlighting messages sent from untrusted automation (via ARC/DKIM anomalies).
538+
• Deploy **voice-biometric challenge phrases** for high-risk phone requests.
539+
• Continuously simulate AI-generated lures in awareness programmes – static templates are obsolete.
540+
541+
---
542+
543+
## MFA Fatigue / Push Bombing Variant – Forced Reset
544+
Besides classic push-bombing, operators simply **force a new MFA registration** during the help-desk call, nullifying the user’s existing token. Any subsequent login prompt appears legitimate to the victim.
545+
546+
```text
547+
[Attacker] → Help-Desk: “I lost my phone while travelling, can you unenrol it so I can add a new authenticator?”
548+
[Help-Desk] → AzureAD: ‘Delete existing methods’ → sends registration e-mail
549+
[Attacker] → Completes new TOTP enrolment on their own device
550+
```
551+
552+
Monitor for AzureAD/AWS/Okta events where **`deleteMFA` + `addMFA`** occur **within minutes from the same IP**.
553+
554+
555+
465556
## Clipboard Hijacking / Pastejacking
466557

467558
Attackers can silently copy malicious commands into the victim’s clipboard from a compromised or typosquatted web page and then trick the user to paste them inside **Win + R**, **Win + X** or a terminal window, executing arbitrary code without any download or attachment.
@@ -482,6 +573,7 @@ mobile-phishing-malicious-apps.md
482573
- [https://0xpatrik.com/phishing-domains/](https://0xpatrik.com/phishing-domains/)
483574
- [https://darkbyte.net/robando-sesiones-y-bypasseando-2fa-con-evilnovnc/](https://darkbyte.net/robando-sesiones-y-bypasseando-2fa-con-evilnovnc/)
484575
- [https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy](https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy)
576+
- [2025 Unit 42 Global Incident Response Report – Social Engineering Edition](https://unit42.paloaltonetworks.com/2025-unit-42-global-incident-response-report-social-engineering-edition/)
485577

486578
{{#include ../../banners/hacktricks-training.md}}
487579

0 commit comments

Comments
 (0)