No-Code Phishing Lure Targets Universities

Threat actors employ No-code platform to harvest credentials.

NEW Piotr Thumbnail 1x1 Feb 25

What is the attack?

  • A phishing attack originating from a compromised account was used to target members of an educational institution. The email, disguised as a legitimate university notice, linked victims to a phishing form built on the no-code platform Jodoo.com, designed to collect sensitive information including usernames and passwords. The goal was credential harvesting for follow-up Account Takeover activity.

Why did it get through?

  • Verified Source: Email sent from a domain passing sender authentication checks.

  • Benign Content: The lure relied on plain text and a simple hyperlink with the name of the targeted organisation.

  • Legitimate Hosting: The phishing form was hosted on Jodoo.com, a legitimate platform, helping it evade link reputation checks.

What is required to solve for this attack?

  • Behavioral Analysis: Abnormal’s Behavioral AI flags never-before-seen senders, unusual email content, and URLs as anomalies that enable the detection of novel attacks.

    • Content Analysis and Natural Language Processing: Abnormal understands the email's content, recognizing the urgency and financial implications as indicators of a financial themed attack.