1 min read

Phishing Campaign Uses Internal Email to Trick Employees into Sharing Office 365 Credentials

Silviu STAHIE

August 10, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Phishing Campaign Uses Internal Email to Trick Employees into Sharing Office 365 Credentials

A campaign targeting Office 365 customers used a compromised internal email for phishing messages, giving much more credence to an email that people would otherwise dismiss immediately.

Phishing emails are a fact of life. Most are caught by corporate security nets and even by commonly used email services. They are also easier to spot, especially if the recipient pays attention to the sender’s real address.

Unfortunately, spotting a phishing email becomes much more difficult when it originates from an internal email address. It looks credible and bypasses security measures. Even trained employees could mistake the email for a legitimate one, although there are other markers to look out for.

“The attacker launched an attack from an IP located in the United Kingdom, which is suspicious because this sender never sends from the UK, and the recipient rarely receives emails from there either,” say the researchers from Abnormal Security. “The attacker leverages a compromised account to send internal phishing attacks. The email itself is simple and masquerades as an encrypted message notification related to a OneDrive for Business file.”

If the employee clicks on the link, it redirects to a phishing site, where attackers ask for his Office 365 credentials. Furthermore, the email doesn’t show the URL, so as to avoid suspicion.

“The link in the email is hidden in text of the company’s name, and the link hosted on the Russian domain is concealed in the text “VIEW ONLINE / DOWNLOAD.” After clicking the links, victims are taken to a phishing page tailored specifically to their company,” the researchers say.

Mitigation for phishing usually starts with employee training. It pays to be extra careful of any message, especially from inside the company, and to be wary when asked for credentials. If there are ever any doubts, contacting the IT department is always an option.

tags


Author



Right now

Top posts

Enhance your cyber resilience and privacy on Computer Security Day in four easy steps

Enhance your cyber resilience and privacy on Computer Security Day in four easy steps

November 29, 2022

2 min read
How to monitor your online privacy during your Thanksgiving trip

How to monitor your online privacy during your Thanksgiving trip

November 22, 2022

3 min read
Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

November 16, 2022

6 min read
Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

November 14, 2022

5 min read
Cyber Tips for a Spook-Free Halloween

Cyber Tips for a Spook-Free Halloween

October 26, 2022

3 min read
August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Hacking cars remotely with just their VIN Hacking cars remotely with just their VIN
Graham CLULEY

December 05, 2022

2 min read
Russian courts attacked by CryWiper malware that poses as ransomware Russian courts attacked by CryWiper malware that poses as ransomware
Graham CLULEY

December 05, 2022

2 min read
Android App in Google Play Store Was Harvesting SMS Messages Helping Criminals Create New Accounts Android App in Google Play Store Was Harvesting SMS Messages Helping Criminals Create New Accounts
Silviu STAHIE

December 02, 2022

1 min read