Article Details

Original Article Text

Click to Toggle View

HubSpot phishing targets 20,000 Microsoft Azure accounts. A phishing campaign targeting automotive, chemical, and industrial manufacturing companies in Germany and the UK is abusing HubSpot to steal Microsoft Azure account credentials. The threat actors use HubSpot Free Form Builder links and DocuSign-mimicking PDFs to redirect victims to credential-harvesting pages. According to Palo Alto Networks' Unit 42 team of researchers, the campaign, which started in June 2024 and remained active until at least September 2024, has compromised approximately 20,000 accounts. "Our telemetry indicates the threat actor successfully targeted roughly 20,000 users across various European companies," explains the Palo Alto Unit 42 report. HubSpot used for credential harvesting HubSpot is a legitimate customer relationship management (CRM) platform used in marketing automation, sales, customer service, analytics, and building websites and landing pages. The Form Builder is a feature that allows users to create custom online forms to capture information from website visitors. In the phishing campaign Unit 42 tracked, threat actors exploited HubSpot Form Builder to create at least seventeen deceptive forms to lure victims into providing sensitive credentials in the next step. Although the HubSpot infrastructure itself wasn't compromised, it was used as an intermediate step to lead victims to attacker-controlled sites on '.buzz' domains mimicking Microsoft Outlook Web App and Azure login pages. Web pages mimicking DocuSign's document management system, French notary offices, and organization-specific login portals were also used in the attacks. Victims were directed to those pages by DocuSign-branded phishing messages containing links to HubSpot, either on an attached PDF or embedded HTML. As the emails contain links to a legitimate service (HubSpot), they are not typically flagged by email security tools, so they're more likely to reach target inboxes. However, the phishing emails associated with this campaign failed Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) checks. Post-compromise activity In cases of successful attacks seen by the researchers, the threat actors used VPNs to make it appear as if they were based on the country of the victimized organization. "When IT regained control of the account, the attacker immediately initiated a password reset, attempting to regain control," describe the Unit 42 researchers. "This created a tug-of-war scenario in which both parties struggled for control over the account." Unit 42 also identified a novel Autonomous System Number (ASN) used in the campaign, which can be used for threat identification along with specific, unusual user-agent strings. Although most of the servers that acted as the backbone of the phishing campaign have long gone offline, the activity is yet another example of legitimate service abuse, as threat actors constantly explore new avenues to bypass security tools.

Daily Brief Summary

CYBERCRIME // Phishing Attack Targets 20,000 Microsoft Azure Accounts

A phishing campaign exploited HubSpot's Free Form Builder to attack automotive, chemical, and industrial companies in Germany and the UK.

Phishers redirected victims to fake Microsoft Azure login pages, leading to around 20,000 compromised accounts.

The attacks utilized deceptive forms and mimicked DocuSign PDFs to harvest credentials from targeted company employees.

Legitimate URLs from HubSpot helped bypass typical email security checks, increasing the success rate of the phishing attempts.

Palo Alto Networks' Unit 42 discovered the campaign, noting its activity from June to September 2024.

Post-compromise tactics included using VPNs to impersonate legitimate user locations and engaging in access-control battles with IT teams.

The campaign also featured unique technical indicators like an Autonomous System Number (ASN) and unusual user-agent strings used in the phishing infrastructure.