Scammers Use a Mix of Stolen Credentials, Inbox Rules, and a Rogue Outlook Client Install to Phish Internal and External Victims

Stu Sjouwerman | Feb 17, 2022

Scammers Use Mix to Phish EmailOrganizations that are not using Microsoft’s multi-factor authentication are finding themselves victims of credential attacks that involve threat actors installing Outlook on a controlled device.

It’s pretty simple: if you don’t have MFA enabled (whether in the context of Microsoft 365 or in general), threat actors only need a username/password combination to gain access to your environment and its’ resources. And this is the lynch pin of a recent string of attacks, according to Microsoft, where the following transpires:

  • A set of Microsoft 365 credentials are obtained via a phishing campaign in the first phase of the attack
  • The credentials are used to associate an attacker-controlled endpoint with the victim’s Azure AD instance
  • Outlook is installed and the credentials are used to allow it to access the victim’s mailbox
  • Inbox rules are setup to delete any messages that include the keywords “junk;spam;phishing;hacked;password” that may warn the compromised user of a problem

The controlled Outlook client is then used for a second attack phase where thousands of phishing emails are sent from the real mailbox, using a malicious document stored in the user’s SharePoint site as the dropper.

In some ways this attack is a bit brazen, as we’re now seeing hackers engaging on a specific client (that can be tracked via IP and MAC address, although I’d suspect a virtual machine on compromised infrastructure is likely used).

There are two lessons to be learned from this. First, if you don’t want to be a victim of the first phase, enable MFA and have users enrolled in Security Awareness Training to keep from having credentials compromised. And second, if you don’t want to be a victim of the second phase, Security Awareness Training, again, is the answer.

Topics: Phishing MFA

12 Ways to Defeat Multi-Factor Authentication On-Demand Webinar

Webinars19Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, explores 12 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he shares a hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick.

Watch the Webinar

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.