HelpSystems announced today the acquisition of Outflank, a well-regarded IT security leader with deep expertise in adversary simulation; specialist cyber security trainings; and a unique cloud-based software offering for red teams, Outflank Security Tooling (OST). Based in Amsterdam, the team of experts works with prominent financial institutions, multinational firms and other parties that require the highest level of security by employing ethical hacking methods that closely mimic those of real cyber criminals. The business joins the HelpSystems Offensive Security portfolio of vulnerability management, penetration testing, and red teaming/adversary simulation solutions to help customers evaluate and prevent risk from many angles.
Many organizations seek advanced security assessments in the form of red teaming operations, yet few have the internal resources to carry out this critical task effectively. Some red teamers develop their own tools or look to niche, open-source options to undertake engagements. Outflank provides consulting, trainings, and a SaaS-based software toolkit that allows stringently vetted organizations to evaluate their defenses in light of today’s high-stakes security environment. In fact, the company developed its flagship Outflank Security Tooling solution to work in tandem with HelpSystems’ Cobalt Strike for a robust approach to adversary simulation.
HelpSystems is a software and services company focused on helping exceptional organizations secure and automate their operations. Their cybersecurity and automation solutions protect information and simplify IT processes to give our customers peace of mind. They know security and IT transformation is a journey, not a destination. Let’s move forward. Learn more at helpsystems.com.
Outflank is a highly specialized IT security company. All team members are seasoned professionals with many years’ experience in security testing and red teaming. The team has performed hundreds of security tests and red teaming engagements and trained nearly 1,000 IT and security professionals. Their strong offensive experience is complemented with deep expertise in IT security defense. Outflank’s OST product is the market’s first solution offering a full spectrum toolset that supports other red teams in their critical jobs of testing security and organization’s resilience to advanced adversary simulations. The team recognizes the vital role of the infosec community and supports this by regularly sharing highly technical research from their specialists, but also advancing the development of the red team framework TIBER.
PhishLabs By HelpSystems Identifies Phishing Campaigns That Are Abusing Google Ad Click Tracking Redirects
Posted in Commentary with tags HelpSystems on October 12, 2022 by itnerdPhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on U.S. and Canadian Financial Institutions. This weakness abuses the fact that the URL shown in Google Ads is not the linked site but rather the final destination, including redirects. By leveraging conditional redirects, the attackers create ads that appear legitimate but will redirect to hostile sites.
In these attacks, both ad text and link hovering falsely state the user will be redirected to the targeted organization’s legitimate site. When the user clicks on the ad, they are routed through multiple redirects before landing on a phishing page.
Legitimate click tracking redirects begin at Google Ads and are routed through numerous click trackers before landing at their desired destination. Google Ads display the user’s final landing page due to client preference that the ad link not display the click tracker. In these attacks, threat actors create their own redirects, which they set up to lead to the legitimate site.
When Google traces the redirects, they see the appropriate site and will have the Ad display the legitimate URL. Threat actors then configure the redirect to use certain criteria such as geo location to direct certain users to a phishing site. These campaigns are potentially utilizing other obfuscation techniques to evade detection by Google, as well.
In the example below, attackers have incorporated a redirect that is not only malicious, but also contains logic that will hide its true destination. When Google attempts to determine where the user will land, they see a legitimate credit union site. As a result, they will only display the credit union URL. If the end user clicks on the ad, they will instead land on a different site that is malicious. In this case, the redirect would only display the phishing site if the user IP was based in Minnesota.
Stacy Shelley, VP of marketing for email security and digital risk protection at PhishLabs by HelpSystems, says:
“It used to be the case that when you hover over a Google Ad, you would see a Google tracking link, and that made it very easy to abuse. So, Google started processing all the redirects until it gets to the final landing page. If the page is legit, the ad will be published with the final landing page as the hover link (no redirects displayed).
“What we’re seeing indicates there are weaknesses in that process that threat actors are exploiting. They use conditional geolocation logic to present the legitimate landing page when Google scans their ad. Google publishes the ad and displays the legit landing URL on hover. As a result, you get a more convincing ad experience (no odd URL) that still redirects targeted victims to a malicious site.”
PhishLabs Actions
PhishLabs has technology in place to monitor Google Ads for malicious content targeting its client base. With the recent change in behavior, the company is in the process of enhancing detection capabilities for these threats.
PhishLabs is actively working with Google and providing information on the behavior observed to reduce the prevalence of these threats and sharing live threat examples as they are detected. Google is also working on implementing preventative measures.
Thanks to PhishLabs By HelpSystems for supplying me with all of this information so that I could present it to you.
Leave a comment »