Vermoedelijk gaat het om
dezelfde aanvallers, zoals o.a. gedocumenteerd in:
25 aug.
https://blog.group-ib.com/0ktapus15 aug.
https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/15 aug.
https://www.silentpush.com/blog/analysis-of-the-twilio-phishing-attacken mogelijk deze al, 12 juli
https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/In elk geval hebben ze gemeen dat ze bijna alle vormen van MFA (2FA) weten te omzeilen (middels proxies zoals Modlishka, Muraena, CredSniper of Evilginx2).
Het advies van Group-IB is m.i. het verstandigst:
Group-IB recommends the following to mitigate similar attacks:
1) End users should always check, carefully, the URL of the site where you are entering your credentials. This is especially important for users with privileged accounts.
2) Treat all URLs that were received from unknown sources as suspicious. If in doubt, forward them to your security team for analysis.
3) Implement a FIDO2-compliant security key from a vendor like YubiKey for multi-factor authentication, like Cloudflare suggests
4) If you think your credentials might have been compromised, immediately change your password, sign off from all active sessions, and report the incident to your manager and security team.
Helaas wordt het ons, gebruikers, onnodig moeilijk gemaakt - zoals ik gisteren (cynisch) beschreef in
https://security.nl/posting/765755.