Latest Multi-Stage Attack Scenarios with Real-World Examples

Share:

Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security. Knowing how they operate is the first step to building a solid defense strategy against them. Let’s examine real-world examples of some of the most common multi-stage attack scenarios that are active right now.

URLs and Other Embedded Content in Documents#

Attackers frequently hide malicious links within seemingly legitimate documents, such as PDFs or Word files. Upon opening the document and clicking the embedded link, users are directed to a malicious website. These sites often employ deceptive tactics to get the victim to download malware onto their computer or share their passwords.

Another popular type of embedded content is QR codes. Attackers conceal malicious URLs within QR codes and insert them into documents. This strategy forces users to turn to their mobile devices to scan the code, which then directs them to phishing sites. These sites typically request login credentials, which are immediately stolen by the attackers upon entry.

Example: PDF File with a QR Code#

To demonstrate how a typical attack unfolds, let’s use the ANY.RUN Sandbox, which offers a safe virtual environment for studying malicious files and URLs. Thanks to its interactivity, this cloud-based service allows us to engage with the system just like on a standard computer.

Get up to 3 ANY.RUN licenses as a gift with a Black Friday offer→

To simplify our analysis, we’ll enable the Automated Interactivity feature that can perform all the user actions needed to trigger attack or sample execution automatically.

2
Phishing PDF with malicious QR code opened in the ANY.RUN sandbox

Consider this sandbox session, which features a malicious .pdf file that contains a QR code. With automation switched on, the service extracts the URL inside the code and opens it in the browser by itself.

image2
The final phishing page where victims are offered to share their credentials

After a few redirects, the attack takes us to the final phishing page designed to mimic a Microsoft site. It is controlled by threat actors and configured to steal users’ login and password data, as soon as it is entered.

image3
Suricata IDS rule identified a phishing domain chain during analysis

The sandbox makes it possible to observe all the network activity occurring during the attack and see triggered Suricata IDS rules

After completing the analysis, the ANY.RUN sandbox provides a conclusive “malicious activity” verdict and generates a report on the threat that also includes a list of IOCs.

Multi-stage Redirects#

Multi-stage redirects involve a sequence of URLs that move users through multiple sites, ultimately leading to a malicious destination. Attackers often utilize trusted domains, such as Google’s or popular social media platforms like TikTok, to make the redirects appear legitimate. This method complicates the detection of the final malicious URL by security tools.

Some redirect stages may include CAPTCHA challenges to prevent automated solutions and filters from accessing malicious content. Attackers might also incorporate scripts that check for the user’s IP address. If a hosting-based address, commonly used by security solutions, is detected, the attack chain gets interrupted and the user is redirected to a legitimate website, preventing access to the phishing page.

Here is a sandbox session showing the entire chain of attack starting from a seemingly legitimate TikTok link.

TikTok URL containing a redirect to a Google domain

Yet, a closer look reveals how the full URL incorporates a redirect to a legitimate google domain.

image5
ANY.RUN automatically solves the CAPTCHA moving on to the next stage of the attack

From there, the attack moves on to another site with a redirect and then to the final phishing page, which is, however, protected with a CAPTCHA challenge.

image6
Fake Outlook page intended for stealing user data

Thanks to advanced content analysis, the sandbox automatically solves this CAPTCHA, allowing us to observe the fake page designed to steal victims’ credentials.

Email Attachments#

Email attachments continue to be a prevalent vector for multi-stage attacks. In the past, attackers frequently sent emails with Office documents containing malicious macros.

Currently, the focus has shifted to archives that include payloads and scripts. Archives provide a straightforward and effective method for threat actors to conceal malicious executables from security mechanisms and increase the trustworthiness of the files.

Example: Email Attachment with Formbook Malware#

In this sandbox session, we can see a phishing email that contains a .zip attachment. The service automatically opens the archive, which has several files inside.

image8
Phishing email with an archive

With Smart Content Analysis, the service identifies the main payload and launches it, which initiates the execution chain and allows us to see how the malware behaves on a live system.

image7
Suricata IDS rule used for detecting FormBook’s connection to its C2

The sandbox detects FormBook and logs all of its network and system activities, as well as providing a detailed threat report.

Get Your Black Friday Deal from ANY.RUN#

Analyze suspicious emails, files, and URLs in the ANY.RUN sandbox to quickly identify cyber attacks. With Automated Interactivity, the service can perform all the necessary analysis steps on its own, saving you time and presenting you only with the most important insights into the threat at hand.

ANY.RUN is currently offering Black Friday deals. Get yours before December 8:

  1. For individual users: 2 licences for the price of 1.
  2. For teams: Up to 3 licences + annual basic plan for Threat Intelligence Lookup, ANY.RUN’s searchable database of the latest threat data;

See all offers and test the service with a free trial today →

Conclusion#

Multi-stage attacks are a significant threat to organizations and individuals alike. Some of the most common attack scenarios include URLs and embeds in documents, QR codes, multi-stage redirects, email attachments, and archived payloads. By analyzing these with tools like ANY.RUN’s Interactive sandbox, we can better defend our infrastructure.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
7:49 am, Jan 18, 2025
weather icon 2°C
L: 2° | H: 3°
overcast clouds
Humidity: 89 %
Pressure: 1031 mb
Wind: 5 mph E
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 9 km
Sunrise: 7:56 am
Sunset: 4:24 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
2° | 3°°C 0 mm 0% 4 mph 90 % 1031 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
1° | 5°°C 0 mm 0% 7 mph 93 % 1024 mb 0 mm/h
Mon Jan 20 9:00 pm
weather icon
3° | 8°°C 0.26 mm 26% 6 mph 97 % 1019 mb 0 mm/h
Tue Jan 21 9:00 pm
weather icon
4° | 8°°C 0 mm 0% 8 mph 95 % 1019 mb 0 mm/h
Wed Jan 22 9:00 pm
weather icon
4° | 7°°C 1 mm 100% 4 mph 99 % 1012 mb 0 mm/h
Today 9:00 am
weather icon
2° | 2°°C 0 mm 0% 2 mph 89 % 1031 mb 0 mm/h
Today 12:00 pm
weather icon
3° | 5°°C 0 mm 0% 3 mph 83 % 1031 mb 0 mm/h
Today 3:00 pm
weather icon
4° | 6°°C 0 mm 0% 3 mph 75 % 1028 mb 0 mm/h
Today 6:00 pm
weather icon
3° | 3°°C 0 mm 0% 4 mph 88 % 1026 mb 0 mm/h
Today 9:00 pm
weather icon
2° | 2°°C 0 mm 0% 3 mph 90 % 1025 mb 0 mm/h
Tomorrow 12:00 am
weather icon
2° | 2°°C 0 mm 0% 3 mph 89 % 1024 mb 0 mm/h
Tomorrow 3:00 am
weather icon
1° | 1°°C 0 mm 0% 3 mph 91 % 1022 mb 0 mm/h
Tomorrow 6:00 am
weather icon
1° | 1°°C 0 mm 0% 3 mph 93 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€100,083.96
1.08%
Ethereum(ETH)
€3,209.93
-2.43%
XRP(XRP)
€3.05
-6.01%
Tether(USDT)
€0.97
-0.04%
Solana(SOL)
€228.03
9.80%
Dogecoin(DOGE)
€0.387356
1.63%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000022
-1.61%
Pepe(PEPE)
€0.000019
0.45%
Peanut the Squirrel(PNUT)
€0.52
-11.92%
Scroll to Top