Fraud - Bubble AI App Builder Used in Microsoft Phishing
Basically, bad actors are using a website builder to trick people into giving away their Microsoft passwords.
Threat actors are exploiting Bubble's app builder to create phishing sites targeting Microsoft accounts. This method bypasses security checks, putting user credentials at risk. Stay vigilant against suspicious links and enable MFA for added protection.
What Happened
Threat actors have found a new way to steal Microsoft account credentials by exploiting the no-code app-building platform, Bubble. They create and host malicious web applications that mimic legitimate Microsoft login pages. Because these apps are hosted on a trusted domain, they evade detection by email security systems. This clever tactic allows users to unknowingly enter their credentials on fake sites, which are then captured by the attackers.
Security researchers at Kaspersky have identified this trend, noting that the phishing pages often appear legitimate and are sometimes obscured by additional security checks like those from Cloudflare. This makes it even harder for users to recognize the threat. By using this method, attackers can gain access to sensitive data linked to Microsoft 365 accounts, including emails and calendars.
Who's Being Targeted
The primary targets of this phishing campaign are users of Microsoft accounts, particularly those using Microsoft 365 services. Given the widespread use of Microsoft products in both personal and professional settings, the potential impact is significant. Anyone who interacts with Microsoft services could be at risk, especially if they receive a link to a Bubble-hosted app.
As phishing campaigns continue to evolve, the use of legitimate platforms like Bubble increases the risk for all users. The complexity of the apps created makes it challenging for even experienced users to identify malicious intent. This adds a layer of danger, as the attacks can reach a broader audience without raising immediate suspicions.
Signs of Infection
Users may not easily recognize they have been targeted until it's too late. Common signs include:
- Receiving unexpected links to web apps claiming to be Microsoft-related.
- Unusual activity in their Microsoft accounts, such as unauthorized access or changes.
- Requests for login credentials from unfamiliar sources.
If users enter their credentials on these fake pages, they may notice unauthorized access to their accounts shortly after. It's crucial to remain vigilant and verify the authenticity of any links before clicking.
How to Protect Yourself
To safeguard against these phishing attempts, users should take several proactive steps:
- Enable Multi-Factor Authentication (MFA) on their Microsoft accounts to add an extra layer of security.
- Be cautious of links in emails or messages, especially if they seem suspicious or unexpected.
- Use a password manager to generate and store complex passwords, reducing the chance of credential theft.
- Regularly monitor account activity for any unauthorized access.
Staying informed about the latest phishing tactics can help users protect their sensitive information. As cybercriminals become more sophisticated, awareness and caution are key to maintaining security.
BleepingComputer