Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

Posted April 8, 2021

Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

  • Researchers with Trustwave SpiderLabs are warning of a phishing campaign that employs what it calls “HTML Lego” to deliver a fake login page.
  • The phishing campaign is aimed at Microsoft 365 users and designed to mimic a Microsoft login interface. Trustwave says the emails contain nothing in the email body but have an attachment that appears to be an Excel file offering information about an investment. This attachment is actually an HTML document with two sections of URL encoded text.
  • “This phishing campaign design was a little more tricky than usual,” researchers say in a summary of the findings. “By improvising an HTML email attachment that incorporates remote JavaScript code located on a free JavaScript hosting site, and ensuring the code is encoded uniquely, the attackers seek to fly under the radar to avoid detection.”
  • A detailed analysis of the campaign can be found here.

| April 8, 2021