Heimdal Security Blog

Threat Actors Used Morse Code to Avoid Detection

The Morse Code signaling system, first used in 1844, is not a common choice for operational security among cyber attackers, yet it was used to obscure malicious software. This is a reminder that, despite their complexities, modern offensive and defensive cyber measures often rely on the simple concept of concealing and cracking code.

On Thursday, Microsoft researchers revealed that threat actors were sending specific victims fake invoices to steal their credentials and to collect IP addresses and location data of victim machines. The hackers changed their encryption schemes every month to try to hide their activity.

Sample phishing email message with the HTML attachment

Image Source

Using xls in the attachment file name is meant to prompt users to expect an Excel file. When the attachment is opened, it launches a browser window and displays a fake Microsoft Office 365 credentials dialog box on top of a blurred Excel document. Notably, the dialog box may display information about its targets, such as their email address and, in some instances, their company logo.

Source

The user is asked to re-enter their password because their Excel document access has supposedly expired. Nevertheless, if the victim does enter their password, they receive a fake note that the submitted password is incorrect. In reality, the attacker-controlled phishing kit running in the background collects the password and other sensitive information about the user.

According to Microsoft’s M365 Security unit principal research manager Christian Seifert, the tech giant has yet to attribute the hackers to a known group.

The use of Morse Code was observed in the February (“Organization report/invoice”) and May 2021 (“Payroll”) waves, the researchers added.

Source

In the February iteration, links to the JavaScript files were encoded using ASCII then in Morse code, while in May, the domain name of the phishing kit URL was encoded in Escape before the entire HTML code was encoded using Morse code.

To reduce the impact of this threat, Microsoft researchers recommend applying these mitigations: