You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/generic-methodologies-and-resources/phishing-methodology/README.md
+92Lines changed: 92 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -462,6 +462,97 @@ You can **buy a domain with a very similar name** to the victims domain **and/or
462
462
463
463
Use [**Phishious**](https://github.com/Rices/Phishious)to evaluate if your email is going to end in the spam folder or if it's going to be blocked or successful.
Modern intrusion sets increasingly skip email lures entirely and **directly target the service-desk / identity-recovery workflow** to defeat MFA. The attack is fully "living-off-the-land": once the operator owns valid credentials they pivot with built-in admin tooling – no malware is required.
468
+
469
+
### Attack flow
470
+
1. Recon the victim
471
+
* Harvest personal & corporate details from LinkedIn, data breaches, public GitHub, etc.
472
+
* Identify high-value identities (executives, IT, finance) and enumerate the **exact help-desk process** for password / MFA reset.
473
+
2. Real-time social engineering
474
+
* Phone, Teams or chat the help-desk while impersonating the target (often with **spoofed caller-ID** or **cloned voice**).
475
+
* Provide the previously-collected PII to pass knowledge-based verification.
476
+
* Convince the agent to **reset the MFA secret** or perform a **SIM-swap** on a registered mobile number.
477
+
3. Immediate post-access actions (≤60 min in real cases)
478
+
* Establish a foothold through any web SSO portal.
479
+
* Enumerate AD / AzureAD with built-ins (no binaries dropped):
480
+
```powershell
481
+
# list directory groups & privileged roles
482
+
Get-ADGroup -Filter * -Properties Members | ?{$_.Members -match $env:USERNAME}
Besides classic push-bombing, operators simply **force a new MFA registration** during the help-desk call, nullifying the user’s existing token. Any subsequent login prompt appears legitimate to the victim.
545
+
546
+
```text
547
+
[Attacker] → Help-Desk: “I lost my phone while travelling, can you unenrol it so I can add a new authenticator?”
[Attacker] → Completes new TOTP enrolment on their own device
550
+
```
551
+
552
+
Monitor for AzureAD/AWS/Okta events where **`deleteMFA` + `addMFA`** occur **within minutes from the same IP**.
553
+
554
+
555
+
465
556
## Clipboard Hijacking / Pastejacking
466
557
467
558
Attackers can silently copy malicious commands into the victim’s clipboard from a compromised or typosquatted web page and then trick the user to paste them inside **Win + R**, **Win + X** or a terminal window, executing arbitrary code without any download or attachment.
-[2025 Unit 42 Global Incident Response Report – Social Engineering Edition](https://unit42.paloaltonetworks.com/2025-unit-42-global-incident-response-report-social-engineering-edition/)
0 commit comments