Network security firm Cofense was able to identify a code trace in phishing emails that revealed SuperMailer abuse in the attacks. Credit: Thinkstock SuperMailer, a legitimate email newsletter program, has been found abused by threat actors to conduct a high-volume credential harvesting campaign, according to network security firm Cofense.“The SuperMailer-generated emails have been reaching inboxes at an increasingly remarkable volume,” Brah Haas, cybersecurity threat intelligence analyst at Cofense, said in a blog post. “Emails containing the unique SuperMailer string barely registered in January and February, but in the first half of May they accounted for over 5% of credential phishing emails.”The unique SuperMailer string refers to a coding mistake included by the threat actors when crafting email templates in SuperMailer. Cofense was also able to identify other indicators of compromise in the emails with the SuperMailer string, which when cross-referenced, rounded out 14% of total phishing incidents identified in May. Phishers are attracted by core SuperMailer featuresSuperMailer is a paid application designed for desktop use, billing itself as a tool for generating and dispatching email HTML newsletters and customized bulk emails. A pack of attractive features, according to Cofense, is possibly responsible for an increased pace of the campaign despite occasional errors. “The threat actors behind the campaign found a working combination of tactics, refined it, and scaled it up, all within a matter of weeks. The fact that the emails are reaching users so consistently underscores the importance of user awareness and a robust, intelligence-driven email security program,” Haas said.The features with great value to threat actors include placeholder fields for email personalization, a visual editor, a multithreaded send option, and compatibility with several mailing systems. While the placeholder fields and visual editor allow for deep customization including the addition of a first name, last name, email address, organization details, and visually appealing HTML emails, the compatibility and send options make it easy to mail it across numerous channels quickly.Furthermore, the attackers were found employing familiar email themes such as password expiration alerts, scanned document or signature service notifications, and overdue invoices or payment reminders, alongside their customization efforts. In recent campaigns, the threat actors are specifically targeting Microsoft login credentials according to Cofense.Multiple tactics to avoid SEG detectionFor phishing emails to successfully deceive the recipient, they must also bypass the recipient’s email filtering systems. In order to achieve this, the recent campaigns generated by SuperMailer employ various strategies to evade detection by security email gateways (SEGs) and other security measures.A few evasion techniques observed in the campaign include open redirect abuse, URL randomization, varied email senders, and reply chains.While open redirects, directing users to external URLs, are used as SEG can’t follow the redirect, URL randomization is a known technique to evade URL blocking owing to the presence of suspicious strings as parts of the URL.Faking the origins of emails and introducing email reply chains are techniques to fake reputation and thereby bypass detection both by SEG and the users. “By combining SuperMailer’s customization features and sending capabilities with SEG evasion tactics, the threat actors behind the campaign have delivered tailored, legitimate-looking emails to inboxes spanning every industry,” Haas said.Despite Cofense catching them because of a coding mistake, Haas cautioned, the threat actors behind the campaign must be taken seriously as they have also shown sophistication through this combination of tactics. Related content brandpost Sponsored by Microsoft Security Building an AI strategy for the modern SOC Transforming SOC teams with the power of AI—identify the highest risk areas, cybersecurity maturity, existing architecture and tools, and budgetary constraints…just to name a few. By Microsoft Security May 23, 2024 5 mins Security news Tracking manual attacks may deliver zero-day previews According to analysis from LexisNexis, human-based digital fraud attacks are increasing more quickly than bot-based attacks — a difference CISOs should leverage for their defenses. By Evan Schuman May 23, 2024 4 mins Cyberattacks Fraud Cybercrime news analysis Microsoft amps up focus on Windows 11 security to address evolving cyberthreats In addition to its Copilot+ secure-cored PC, the company announced enterprise security enhancements, admin privilege changes, and the deprecation of legacy authentication protocols. By Lynn Greiner May 23, 2024 7 mins Windows Security news LockBit no longer world’s No. 1 ransomware gang After dominating for eight months, LockBit has been overtaken by ransomware gang Play in the wake of a law enforcement crackdown and unmasking of LockBit’s alleged creator. By Viktor Eriksson May 23, 2024 2 mins Ransomware Cybercrime PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe