IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Hackers spoof Zix in credential phishing attack

The attack has impacted around 75,000 Office 365, Google Workspace and Exchange users

Hackers have mounted a credential phishing attack that spoofs an encrypted message notification from Zix to steal Office 365, Google Workspace, and Microsoft Exchange data.

Security researchers from Armorblox said the attack has affected around 75,000 users, with small groups of cross-departmental employees targeted in each customer environment.

The hackers used several techniques to steal data, including social engineering, brand impersonation, replicating existing workflows, drive-by download, and exploiting legitimate domains.

Victims received emails titled “Secure Zix message.” This email included a header in its body reiterating the email title and claiming the victim has received a secure message from Zix, a security technology company that provides email encryption and email data loss prevention services.

The email invites the victim to click on the “Message” button to view the secure message. While the fake email is not a facsimile, it bears enough surface-level resemblance to pass the unsuspecting victims’ eye tests.

The email sender’s domain was “thefullgospelbaptist[.]com,” a religious organization established in 1994. Looking at WhoIs details of the parent domain, the domain now redirects to “fullgospelbaptist[.]org.”

“It’s possible that attackers exploited a deprecated or old version of this organization’s parent domain to send the malicious emails. The email passed all authentication checks (SPF, DKIM, DMARC),” said researchers.

Related Resource

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Man and woman looking at a laptop in an office building Free download

Researchers said clicking the “Message” link in the email attempts to install an HTML file named “securemessage” on the victim’s system. Opening the file in a virtual machine (VM) wasn’t possible because the redirect to download the file didn’t appear within the VM. At the time of writing, opening this HTML message after download leads to a “block” page driven by most site-blockers. 

The researchers said a select group of employees — usually across departments — were targeted within each customer environment.

“For example, for one of our SLED customers, people targeted by this attack included the CFO, a Director of Operations, a Director of Marketing, and a professor. For another customer, a wellness company, the target employees included the SVP of Finance and Operations, the President, and a utility email alias (member.services@company[.]com),” said researchers.

Researchers added that while the spread is seemingly randomized, attackers might also have deliberately chosen their victims to be across departments so it contained a good mix of senior leadership and individual contributors.

“These employees are unlikely to communicate often with each other when they receive an email that looks suspicious,” they added.

Featured Resources

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

The Total Economic Impact™ of IBM robotic process automation

Cost savings and business benefits enabled by robotic process automation

Free Download

Multi-cloud data integration for data leaders

A holistic data-fabric approach to multi-cloud integration

Free Download

MLOps and trustworthy AI for data leaders

A data fabric approach to MLOps and trustworthy AI

Free Download

Recommended

Getting board-level buy-in for security strategy
Whitepaper

Getting board-level buy-in for security strategy

30 Nov 2022
Best free malware removal tools 2022
Security

Best free malware removal tools 2022

28 Nov 2022
2022 IBM's Security X-Force cloud threat landscape report
Whitepaper

2022 IBM's Security X-Force cloud threat landscape report

22 Nov 2022
2022 Magic quadrant for Security Information and Event Management (SIEM)
Whitepaper

2022 Magic quadrant for Security Information and Event Management (SIEM)

22 Nov 2022

Most Popular

Empowering employees to truly work anywhere
Sponsored

Empowering employees to truly work anywhere

22 Nov 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022