Hacking

Deepfake and smishing. How hackers compromised the accounts of 27 Retool customers in the crypto industry

Software development company Retool was the victim of a smishing attack that resulted in the compromise of 27 accounts of its cloud customers.

Software development company Retool revealed that 27 accounts of its cloud customers were compromised as a result of an SMS-based social engineering attack.

The company states that one of its employees was compromised on August 27, 2023, via a spear phishing attack. Once the employee’s account was compromised, the threat actors were able to navigate through multiple layers of security controls.

Retool believes that the attackers abused the Google Account cloud synchronization feature to breach the organization.

Several employees received targeted SMS messages posing as a member of IT who was reaching out to them due to an account issue that would prevent open enrollment which affects the employee’s healthcare coverage. The company noticed that the timing of the attack coincided with a recently announced migration of logins to Okta. The SMS includes a URL crafted to appear as the company’s internal identity portal.

Then the attackers called up the employee posing as a member of the IT team. The attackers deepfaked the actual voice of one of the IT staffers and tricked the employee into providing the multi-factor authentication (MFA) code.

“The additional OTP token shared over the call was critical, because it allowed the attacker to add their own personal device to the employee’s Okta account, which allowed them to produce their own Okta MFA from that point forward. This enabled them to have an active GSuite session on that device. Google recently released the Google Authenticator synchronization feature that syncs MFA codes to the cloud. As Hacker News noted, this is highly insecure, since if your Google account is compromised, so now are your MFA codes.” reads a statement published by Retool.

The company reported that the fact that the victim employee also activated the Google Authenticator’s cloud sync feature allowed the attackers to access all its MFA codes. Once obtained these codes (and the Okta session), the attacker gained access to the company VPN and its internal admin systems. Then the intruders were able to takeover the accounts of a specific set of customers, all in the crypto industry. The attackers changed emails for users and reset passwords.

We have an internal Retool instance used to provide customer support; this is how the account takeovers were executed. The authentication for this instance happens through a VPN, SSO, and a final MFA system. A valid GSuite session alone would have been insufficient.” continues the company. “The fact that Google Authenticator syncs to the cloud is a novel attack vector. What we had originally implemented was multi-factor authentication. But through this Google update, what was previously multi-factor-authentication had silently (to administrators) become single-factor-authentication, because control of the Okta account led to control of the Google account, which led to control of all OTPs stored in Google Authenticator. We strongly believe that Google should either eliminate their dark patterns in Google Authenticator (which encourages the saving of MFA codes in the cloud), or at least provide organizations with the ability to disable it. We have already passed this feedback on to Google.”

Social engineering attacks target the human component of any organization and the use of generative AI and deepfakes is bringing the level of sophistication of such attacks to a higher level.

Specific training programs against social engineering attacks and the adoption of an efficient Information Security Management System (ISMS) can allow organizations to be more resilient against such kinds of attacks.

Recently the US CISA released the Cybersecurity Information Sheet (CSI), Contextualizing Deepfake Threats to Organizations, which provides an overview of synthetic media threats, techniques, and trends.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Retool)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Hackers leak 170k Taylor Swift’s ERAS Tour Barcodes

The threat actor Sp1d3rHunters leaked valid Taylor Swift ’s ERAS Tour barcodes threatening to leak…

15 hours ago

Polyfill.io Supply Chain Attack: 384,773 hosts still embedding a polyfill JS script linking to the malicious domain

Cybersecurity company Censys has identified over 380,000 hosts that are still referencing the malicious polyfill.io…

17 hours ago

New Golang-based Zergeca Botnet appeared in the threat landscape

Researchers uncovered a new Golang-based botnet called Zergeca that can carry out distributed denial-of-service (DDoS)…

19 hours ago

Microsoft discloses 2 flaws in Rockwell Automation PanelView Plus

Microsoft discovered two flaws in Rockwell Automation PanelView Plus that remote, unauthenticated attackers could exploit.…

20 hours ago

Hackers compromised Ethereum mailing list and launched a crypto draining attack

Hackers compromised Ethereum 's mailing list provider and sent phishing messages to the members attempting…

21 hours ago

OVHcloud mitigated a record-breaking DDoS attack in April 2024

OVHcloud successfully mitigated a record-breaking DDoS attack in April, which reached 840 million packets per…

1 day ago

This website uses cookies.