A new phishing campaign was spotted in the wild, where the threat actors are found using Morse code to hide their malicious URLs. This happened to be targeting the campaign, as theyโre sending phishing emails to collect office 365 credentials of employees of the companies. Samples of the attack are uploaded into VirusTotal.
Phishing Campaign Using Morse Code

As detailed by BleepingComputer, the campaign was first reported on Reddit and had some of the samples uploaded to VirusTotal last week. Explaining the campaign, it starts with an email bearing the subject as โRevenue_payment_invoice February_Wednesday 02/03/2021.โ
Opening the email will show an attached Excel document titled โ[company_name]_invoice_[number]._xlsx.hTML.โ The company name and number will be replaced with the targetโs to make it more specific and relatable. Opening the attachment in a text editor shows JavaScript code being written in Morse code.
As the Morse code defines the alphabets and numbers with just dots and dashes, it makes it hard, and unsuspicious to the email filtering engines to detect the malicious links in it. Here, the code is being written in various symbols like โaโ is mapped to โ.-โ and the โbโ is mapped to โ-โฆโ, etc.
Also Read- Best Morse Code Apps For Android
A decodeMorse() function was set to decode the string, to finally unpack into JavaScript tags and inject them into the HTML page. These combined will make up a fake Excel page that asks the user (target) to sign-in before viewing. Entering the credentials without realizing it as a fake page will export them to the hackerโs C2.
To date, BleepingComputer spotted seven companies targeted with this campaign, namely the SGS, Dimensional, Metrohm, SBI (Mauritius) Ltd, NUOVO IMAIE, Bridgestone, Cargeas, ODDO BHF Asset Management, Dea Capital, Equinti, and Capital Four.




