Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: A Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) ) SANS ISC InfoSec Forums

Special Webcast: What you need to know about the crypt32.dll vulnerability. Register Now

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
A Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )

I got a little bit a better done Phish this morning:

Initially, I was interested in this because it looks like some of the other real estate related phishing/Business Email Compromise attacks I have seen in the past. The goal is to usually get a victims email credentials to later inject emails with fraudulent wire instructions. Many million dollars have been lost in these attacks in the past. I found it interesting that the attacker specifically requested to verify wire instructions via the phone.

So what do you do with a phishing email:

(1) Click on the link of course

The link itself led to hxxps:// /b/s!Ajbc-YlY0yFbdwRk1MlFeXtt4YU . "" is actually a legitimate Microsoft owned domain and used as a short link for OneDrive documents. Sure enough, I ended up at a legitimate OneDrive URL. But the document displayed asked me to click again:

So the next step would be to give the attacker my "honey password". Sadly, I didn't get to this part because the attacker didn't anticipate victims using IPv6. The blocklist the attacker uses to exclude researchers is only considering IPv4, and errors out on IPv6.

This is actually a pretty major oversight. Considering that this attack probably targets home users and also would get good results from mobile users. According to Google [1], about 30 % of these requests will come via IPv6 for users in the US.



Johannes B. Ullrich, Ph.D. , Dean of Research, SANS Technology Institute

I will be teaching next: Defending Web Applications Security Essentials - SANS San Francisco Spring 2020


3735 Posts
ISC Handler

Sign Up for Free or Log In to start participating in the conversation!