chat
expand_more

Adaptive Phishing: When Whimsical Fails, Lucid Strikes

Pivoting attack delivery to bypass users and SEGs, leading to ATO.

Piotr Avatar Synthesia Thumbnail 1x1 3

What is the attack?

  • Phishing Delivery: Attackers compromised a vendor account to distribute confidential documents via Whimsical, embedding a phishing link mimicking the Office 365 login page. When the recipient couldn’t access the document, they asked the attacker for an alternative method.

  • Adaptable Tactics: The attacker pivoted to Lucid, another design platform, to re-send the phishing link, making the attack seem more legitimate and increasing the likelihood of engagement.

  • ATO: Using stolen credentials, the attacker accessed the account from a VPN to evade geolocation-based detection and conducted typical BEC activities.

Why did it get through?

  • Verified Source: Email sent from a trusted compromised vendor domain passing sender authentication checks.

  • Trusted Cloud Platform: By hosting the malicious link within a Whimsical and Lucid, attackers exploited the platform's reputation as a legitimate tool used widely by design and business teams.

  • URL Crawling/Analysis Protection: The added Captcha functionality limits automated link crawling and URL analysis features, increasing the difficulty for automated detection.

What is required to solve for this attack?

  • Behavioral Analysis: Abnormal’s Behavioral AI flags never-before-seen senders, unusual email content, URLs, and user sign-ins as anomalies that enable the detection of novel attacks.

  • Content Analysis and Natural Language Processing: Abnormal understands the email's content, recognizing the urgency and financial implications as indicators of a financial themed attack.