August 14, 2019 By David Bisson 2 min read

Cyberattackers are passing around fake Microsoft account emails under the pretense of “unusual sign-in activity” to trick users into handing over their credentials.

Bleeping Computer spotted the phishing emails and noted that the actors took their time to make the messages look convincing. According to the researchers, the emails arrived with the same look and information fields as official Microsoft notifications and came with the same sender email address — [email protected] — as the one used in legitimate Microsoft correspondence.

Clicking the “Review recent activity” link redirected users to a fake Microsoft landing page designed to steal their credentials. After the page saved the submitted details, it directed victims to an error page on Microsoft’s Outlook support site. According to the researchers, the bad actors likely aimed to trick users into thinking there was a problem with their account and that nothing suspicious had happened.

A History of Phishing for Microsoft Details

Cybercriminals have targeted users’ Microsoft credentials many times in the past. In December 2018, for instance, the SANS Internet Storm Center detected a phishing attack that used emails disguised as nondelivery receipts sent from Microsoft Office 365.

Several months later, Bleeping Computer observed an operation in which phishing emails claimed the Office 365 team had detected a large number of file deletions on their account. The computer help site reported another phishing campaign in early July; this time, the attack emails lured victims with a fake notification about a new audio message from a contact in their address book.

Protect Your Users From Fake Microsoft Account Emails

One effective way to protect your organizations from fake Microsoft account emails is by using ahead-of-threat detection to flag suspicious domains before phishers can use them for their campaigns. This technique should be part of a layered approach to email security that includes security information and event management (SIEM), mail scanning services, perimeter protection and other measures.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today