Increased Adoption of IPFS Observed in Phishing Emails

Alert - Advisory

Garden State Cyber Threat Highlight

Original Release Date: 4/10/2023

Summary

The NJCCIC observed a high volume of phishing emails targeting New Jersey State employees, attempting to harvest credentials or deliver malware by abusing the Interplanetary File System (IPFS) and other Web3 technologies. IPFS is a giant peer-to-peer distributed file storage protocol that enables users to exchange files worldwide. Unlike centralized systems which use file paths, IPFS files use a decentralized naming system and are given unique content identifiers (CID) derived from a file’s hashed content. IPFS is often used for legitimate purposes; for example, blockchain and NFT projects commonly implement decentralized storage such as IPFS. Throughout 2022, analysts observed threat actors actively leveraging IPFS in phishing attacks and its popularity has steadily increased largely due to low-cost storage and resiliency against content moderation. Additionally, the use of common IPFS gateways makes it more difficult for organizations to block access.

The phishing emails contain various subject lines including document-signing services, invoices, receipts, or claims that unusual sign-in activity was detected. The message often contains typical phishing red flags and an IPFS file link (1, 2 ) that redirects recipients to various web pages with the intent to harvest credentials, steal funds, or deliver malware. In the above example, the included link was appended with the recipient's email address and redirected the user to a prefilled authentication page. While IPFS gateway providers attempt to regularly delete links to fraudulent and malicious files, the detection and deletion process of links at the gateway level is slow. The NJCCIC analysts assess that this activity will continue to increase due to its resiliency against content moderation, ease of use, obscured attribution, and reduced cost to the threat actor.

Recommendations

The NJCCIC recommends users and organizations educate themselves and others on these emerging technologies and how they are employed to evaluate how best to implement security controls and reduce victimization. Users are advised to refrain from responding to unsolicited communications, clicking links or opening attachments from unknown senders, and exercise caution with communications from known senders. If unsure of the legitimacy, contact the sender via a separate means of communication, such as by phone, before taking action. Additionally, if IPFS is not used in the organization, administrators should consider flagging user access to IPFS gateways as atypical. Further technical details and indicators of compromise can be found in the Cofense blog post and TrendMicro article.

 

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.