Attackers Impersonate Microsoft Services To Target Customers

Share post:

Attackers are actively impersonating Microsoft services to target customers with Microsoft, Office 365, Outlook, and OneDrive accounts.

The campaign was discovered by a security researcher, MalwareHunterTeam. According to the researcher, attackers could fake the custom branding and web hosting features to host static landing phishing sites.

Misused platforms include Microsoft Azure’s Static Web Apps which is used to steal Microsoft, Office 365, Outlook and OneDrive credentials.

While the fake landing pages can be used to scam Microsoft customers, they could also be used to target users of other platforms such as Rackspace, AOL, Yahoo and other email providers.

Users are often advised to check URLs when prompted to fill in their account details in a login form.

However, this advice is almost pointless in this scenario, as users are deceived by the subdomain and the valid TLS certificate.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs


Related articles

Abuse of valid accounts by threat actors hits a high, says IBM

Attackers are finding that obtaining valid credentials is an easier route to achieving their goals, s

Cyber Security Today, Feb. 21, 2024 – A patch warning from ConnectWise, the latest ransomware news, and more

This episode reports on a report comparing business email compromise attacks against ransomware

UK leads takedown of LockBit ransomware gang’s website

The LockBit ransomware gang’s website has been seized, several news agencies reported late Monday. The Reuters news agency and The Register are carrying stories based on a new splash screen that has appeared on the gang’s website. It says, “This site is now under the control of the National Crime Agency of the UK, working

Cyber Security Today, Feb. 19, 2024 – Fake police data breach notification fools Maine’s AG site

This episode reports a recent fake data breach report and two real ones, a man pleads guilty to being involved in malware distribution

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways