All 200 Million Office 365 Users at Risk by a New Global Spear Phishing Attack Spoofing Microsoft.com



Global Spear Phishing AttackA new spear phishing campaign appearing to come from a microsoft.com email address is targeting organizations in critical industries that use Office 365 for email to steal credentials.

A recent attack was spotted by researchers at security vendor Ironscales attacking Office 365 accounts belonging to organizations primarily in financial services, healthcare, insurance, manufacturing, utilities, and telecom sectors. This relatively simple attack appears to come from no-reply [at] microsoft.com informing the potential victim that certain email messages have been quarantined and that the victim needs to review the messages and determine whether to reclaim them or delete them. According to Ironscales, the language used in the phishing email is designed to create a sense of urgency – a common element in most scams.

Upon clicking the provided link, users are taken to a spoofed Office 365 logon page where credentials are captured and stolen.

According to Dark Reading’s article on the attack, a Microsoft spokesperson is quoted as saying “Contrary to claims in the third party report, Office 365 has rich in-built controls to block domain spoofing emails and enforces DMARC checks. We encourage all customers to make sure they have deployed the latest security controls in Office 365, enabled multi-factor authentication for Office 365, and train their end users to observe caution when clicking on links from unknown senders."

But given that Ironscales customers are seeing this attack, it’s evident that some are getting through to a user’s Inbox.

What’s needed is to educate users via new school Security Awareness Training on what elements of an unsolicited email should trigger their sense of suspicion. In this case, the urgency denoted to simply review some emails that may or may not be important.


Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/phishing-security-test-offer

Topics: Spear Phishing



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews