POST HEADER_Microsoft phishing attack sneakier than usual

Microsoft: New phishing attack ‘sneakier than usual’

Posted on 08/02/2021

by QCM-Technologies

Microsoft warns phishing attack is 'sneakier than usual'

Microsoft's Security Intelligence team has issued an alert to Office 365 users and admins to be on the lookout for a "crafty" phishing email with spoofed sender addresses that is 'sneakier than usual'.

Microsoft put out an alert after observing an active campaign targeting Office 365 organizations with convincing emails and several techniques to bypass phishing detection, including an Office 365 phishing page, Google cloud web app hosting, and a compromised SharePoint site that urges victims to type in their credentials.

"An active phishing campaign is using a crafty combination of legitimate-looking original sender email addresses, spoofed display sender addresses that contain the target usernames and domains, and display names that mimic legitimate services to try and slip through email filters," the Microsoft Security Intelligence team said in an update.

"The original sender addresses contain variations of the word "referral" and use various top-level domains, including the domain com[.]com, popularly used by phishing campaigns for spoofing and typo-squatting."

 

The phishing group is using Microsoft SharePoint in the display name to entice victims to click the link. The email poses as a "file share" request to access bogus "Staff Reports", "Bonuses", "Pricebooks", and other content hosted in a supposed Excel spreadsheet. It also contains a link that navigates to the phishing page and plenty of Microsoft branding.

While convincing Microsoft logos are littered across the email, the main phishing URL relies on a Google storage resource that points the victim to the Google App Engine domain AppSpot – a place to host web applications.

"The emails contain two URLs that have malformed HTTP headers. The primary phishing URL is a Google storage resource that points to an AppSpot domain that requires the user to sign in before finally serving another Google User Content domain with an Office 365 phishing page," Microsoft notes.

The second URL is embedded in the notifications settings links the victim to a compromised SharePoint site. Both URLs require sign-in to get to the final page, allowing the attack to bypass sandboxes.

 

This campaign is "sneakier than usual", Microsoft notes. Microsoft has been touting its 'Safe Links' Defender for Office 365 phishing protection feature that 'detonates' phishing email at the point a user clicks on a link that matches its list of known phishing pages.

Microsoft has also published details on GitHub about the infrastructure linked to the spoofed emails imitating SharePoint and other products for credential phishing.

"The operator is also known to use legitimate URL infrastructure such as Google, Microsoft, and Digital Ocean to host their phishing pages," Microsoft notes.

Need help with your Microsoft Office 365?

Ways to Reach Us

CALL US
Tim Kinnerup, Vice President**
(480) 483-4371 Office Direct
** If your situation is urgent, please reach out to Tim Kinnerup for assistance


EMAIL US  
info@box2449.temp.domains


USE OUR >> 
QUICK CONTACT FORM

 

QCM Technologies, Inc.
www.qcmtech.com
Scottsdale, Arizona • Est. 2001
Serving the Southwest for over 20 Years

 

SOURCE:  ZDNet

 

DISCOVER A SMARTER SOLUTION TODAY

Events + Press

Blogs

Case Studies

Research Downloads

Videos

Industry News