Thank you for your interest in Obsidian! Please enter your information in the form and we will contact you shortly to schedule a demo.
⚡ Key takeaways
Our research team has uncovered a new phishing campaign targeting legal, government and construction sectors, dubbed “Butcher Shop” (yes, Butcher Shop).
In this blog post, we break down how this campaign works, why it’s worth paying attention to, and steps you can take to protect your organisation.
Butcher Shop surfaced in early September and primarily targets Microsoft 365 accounts. The attack relies on phishing links delivered through various channels, such as:
An attacker uses a trusted domain (company.com) to redirect users to a malicious site (evil.com). These redirects make it difficult for traditional phishing solutions to block the attack since legitimate domains are involved.
Related: More on why traditional protections aren’t enough here.
Since the campaign began, we’ve identified over 200 domains and 400 unique URLs tied to it. These domains often mimic industries like law, government, and construction. Most are short-lived, existing only for a few days, making URL-based blocking ineffective.
Traditional email security tools struggle with campaigns like this due to their multilayered approach and use of legitimate verification methods like Cloudflare Turnstiles. Blocking domains isn’t enough when attackers rotate through hundreds of them, and bypassing MFA protections puts even well-secured organizations at risk.
Related: Other key phishing campaigns you should pay attention to.
We reviewed the phishing pages linked to this campaign over the past few weeks and found that most domains were tied to the legal, government, and construction sectors, indicating these were the primary targets.
As of the publication of this post, the most prevalent domains tied to this campaign can be seen below.
brandlawdocs[.]com | businessinvocloud[.]com | appforconstruction[.]com |
federalbusinesslegal[.]com | invocdocs[.]com | norterc[.]com |
invocelaw[.]com | payrollservicesfederal[.]com | businesscloudapps[.]com |
invoicingconstructionlaw[.]com | appinvoices[.]com | invoicinglawyer[.]com |
outlooklawyer[.]com | docfederal[.]com | businesslawsheets[.]com |
lawforconstruction[.]com | federalapphub[.]com | lawfinancelabel[.]com |
legalservicesfederal[.]com | kontra-werbetechnik[.]eu | constructionfederal[.]com |
The phishing URLs for this campaign follow a consistent pattern, typically containing a subdomain, the main domain, TLD, and a 5-digit string at the end.
Before displaying the phishing page, a custom page with a Cloudflare turnstile is shown to verify that the user is, in fact, human. These turnstiles make it harder for email protection systems, like URL scanners, to detect phishing sites.
Obsidian has found that more than 77% of general phishing sites were hosted on Cloudflare, and over 99% of the sites linked to this campaign were behind a turnstile.
The title of the webpage changes with each refresh. It follows a botanical theme, with the first word being any plant-related term, and the second word almost always one of these: Sprout, Leaf, Blossom, Tree, Onion, Flower, or Root. This results in page titles like YewBlossom, RoseSprout, or FuchsiaLeaf (they sound pretty pleasant right?).
The phishing page is loaded through a script called bootstrap.js, which is hosted on Tencent Cloud’s CDN. This script performs several functions, including building the phishing page, validating and stealing credentials, and redirecting the user after the attack. It also contains a base64-encoded URL, which is the final destination for the stolen credentials. While the bootstrap script is obfuscated, it remains the same for every phishing page using this template, except for the encoded command-and-control (C2) link.
The final feature of the Butcher Shop campaign is the inclusion of randomized, meat-themed lorem ipsum text within the comments of the phishing page’s code. This text resembles the content generated by a service called Bacon Ipsum, and may be generated using its API or jQuery plugin.
This campaign is designed to closely resemble a real login process, making it very difficult to detect (and stop). Steps as follows:
There are two known login page templates associated with this campaign.
The first template resembles a Microsoft 365 login page:
The second template appears to be a targeted service phishing page. In this example, we see a OneDrive templated phishing page. This template is newer to the scene:
Both of these templates closely mimic legitimate Microsoft login pages, making it difficult for the average user to avoid falling victim to the phishing website.
Exploring some of the C2 URLs further may reveal a directory containing a number of subdomains, each one likely a receiving point for the C2 server.
Trying to access the links brings you to a page with a broken Cloudflare turnstile.
As phishing attacks grow more sophisticated, traditional security measures like email security gateways (ESGs) are no longer enough to keep up. The Butcher Shop campaign shows how attackers can easily bypass these defenses to steal credentials. To stay ahead, you need a more advanced, multi-layered approach to phishing protection.
Obsidian’s platform has blocked hundreds of phishing attempts, including 93% that targeted customers with ESGs in place, and 15% that failed to trigger any alerts.
To learn more, reach out to us any time to ask questions or schedule a demo.