Phishing campaign targets Office users

VG word pixels

Microsoft Office 365

Anyone who uses Office 365 could currently be the target of a phishing campaign. Accounts with active 2FA are also targets of the attacks. This is how the attackers act.

news

VG word pixels

Woman uses a laptop with the Microsoft Office logo on it.
Microsoft has detected a phishing campaign targeting Office 365.
© Adobe Stock: PhotoGranary

In a large-scale phishing campaign, attackers currently want to take over Office accounts. This is what Microsoft security researchers found out. in one blog post the company warns that since September 2021, more than 10,000 organizations have been targeted by the attackers.

The attackers first send phishing emails with defective links to companies. The email contains an HTML file, for example, which is supposed to hide a voice message for the victim. After the click, the information appears that the voice message is being downloaded. After that, the target is redirected to a supposed Microsoft login page to enter their account details.

In fact, it is an Adversary-in-the-middle (AiTM) website. This sits between two network components, usually client and server, in order to intercept data, in this case login data and session cookies.

The victims’ mail accounts are then taken over with the login data, while the session cookies are used to bypass 2-factor authentication (2FA). After account takeover, the attackers begin a business email compromise (BEC) campaign. So they send fake corporate emails to other targets to get them to transfer payments.

According to Microsoft, phishing attacks are still the most common type of digital attack against companies. Phishing attacks have increased sharply since 2020. In addition, attackers are increasingly preparing to bypass 2FA.

In order to actively protect yourself against the phishing campaign, Microsoft gives a number of instructions:

  • Enable Conditional Access policies: Conditional Access policies are evaluated each time an attacker attempts to use a stolen session cookie. Organizations can protect against attacks using stolen credentials by enabling policies such as compliant devices or trusted IP addresses.
  • Invest in modern anti-phishing solutions: These monitor and scan incoming emails and visited websites. For example, organizations can deploy web browsers that automatically detect and block malicious websites, including those used in this phishing campaign.
  • Continuously check for suspicious or anomalous activity: This does not include looking for login attempts with suspicious characteristics (e.g. location, ISP, user agent, use of anonymization services) or unusual mailbox activities such as creating inbox rules with suspicious purposes or unusual amounts of mail item hits by trusted IP addresses or devices.
Microsoft Office brochure on a notebook

Protective function with questionable success

Microsoft removes macro block for Office

Macros will no longer be automatically disabled in Microsoft Office. The block was originally intended to protect against ransomware.

15.7.2022 from
Alan Friedrichs

Continue to home page

more on the subject

How to spot phishing scams

Cyber ​​attacks via email

Phishing emails in the home office are increasing

In times of increased home office work, phishing emails are very popular with attackers. This is how cyber attacks happen.

amazon phishing warning

Alleged account verification and more

Beware of emails from Amazon: Police warn of phishing

The police are warning of a new wave of Amazon phishing: Cyber ​​criminals are trying to steal access data with emails that look deceptively real.

microsoft 365 office design preview vision

New user interface

Microsoft 365: Video shows preview of new Office design

Less UI, focus on content: Microsoft announces major changes for the Office interface. A video shows the new vision for Microsoft 365.

Microsoft Office Tips

When is the patch coming?

Office vulnerability: “Follina” vulnerability…

The “Follina” vulnerability has been confirmed by Microsoft and allows attacks on PCs via Office files. So far there is no patch.

Microsoft Office brochure on a notebook

Protective function with questionable success

Microsoft removes macro block for Office

Macros will no longer be automatically disabled in Microsoft Office. The block was originally intended to protect against ransomware.

Reference-www.pc-magazin.de