Attack Overview

Step 1: Email

A compromised vendor account sends an email sharing a Whimsical document. The email appears secure and contains a link to view a document supposedly containing confidential information.

Status Bar Dots
Attack Library Repo 12 6 Feb Image 1
  • Sent from a legitimate, compromised vendor domain.
  • Initial link points to a Whimsical document with a phishing link.
  • Spoofs a standard business document-sharing workflow.

Step 2: Phishing Link and Platform Pivot

When the recipient cannot access the original link, the attacker adapts by sending a new phishing link using a Lucid document, appearing even more legitimate to the recipient.

Status Bar Dots
Design Diagramming Tools Attack Lucidchart Email E
Status Bar Dots
Design Diagramming Tools Attack Lucidchart Phishing Page E
  • Attacker switches from Whimsical to Lucid.
  • Lucid-hosted link includes the same credential phishing payload.
  • Increased legitimacy through use of trusted design platforms.

Step 3: Account Takeover via VPN Access

Once the victim enters their credentials, the attacker logs in via a VPN to avoid detection based on geolocation. The compromised account is then used for business email compromise (BEC) activities.

Status Bar Dots
Attack Library Repo 12 6 Feb Image 4
  • Stolen credentials used for login from unrecognized VPN.
  • Attacker behavior includes suspicious sign-in patterns.
  • Used for further phishing or internal compromise.

How Does This Attack Bypass Email Defenses?

This email attack bypasses traditional security solutions for several reasons, including:

  • The email came from a trusted vendor domain that passed SPF, DKIM, and DMARC.
  • The malicious link was hosted within trusted platforms (Whimsical and Lucid).
  • Cloudflare Turnstile verification test limited link analysis by automated tools.

How Did Abnormal Detect This Attack?

This attack was detected using AI and ML by analyzing various factors, including:

  • Abnormal sender behavior and message formatting.
  • Unusual URLs hosted on design platforms.
  • Contextual clues indicating urgency and potential financial impact.

By recognizing established normal behavior and detecting these abnormal indicators, a modern email security solution has the ability to prevent this attack from reaching inboxes.

Please note the exact detection mechanism from Abnormal Security's system might include proprietary techniques and methodologies not disclosed here.

Analysis Overview

Vector

Link-based

Goal

Credential Theft

Tactic

Compromised Sending Domain
Legitimate Hosting Infrastructure
Captcha-Protected Phishing Page

Theme

Secure Message
Financial Services

Impersonated Party

External Party - Vendor/Supplier

See How Abnormal Stops Emerging Attacks

See a Demo