A phishing campaign starting at the beginning of the month uses a novel approach of utilizing Morse code to obfuscate the malicious URLs used to generate a login form.
The campaign starts with a simple email pretending to be an invoice with a HTML attachment disguised as an Excel spreadsheet.
The HTML in harmless at first glance but does contain JavaScript that maps letters and numbers to their Morse code equivalent in dits (periods) and dahs (dashes).
The script then decodes a Morse code string that leads to two <script> statements that are then injected into the HTML document when opened.

These two scripts contain the meat of the phishing page, including the login form, images to use, a fake excel background, etc.
To display company logos for the targeted companies, the attachment uses http://logo.clearbit.com/  to automatically fetch a logo via a domain name.

For example, http://logo.clearbit.com/microsoft.com  pulls down Microsoft's logo.

This allows for a dynamic approach to rendering the login form.
This ultimately displays a login form in the browser that pretends to be an Excel spreadsheet where the user needs to login again to view it.
You can follow @BleepinComputer.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.