Attackers are posing as Office
365 support in phishing emails that warn users about
an “unusual volume of file deletion” on their accounts, BleepingComputer has
found. The emails claim that a medium-severity alert was triggered by fifteen
file deletions within five minutes. If victims click on the link to view the
alert’s details, they’ll be taken to a spoofed Microsoft login page. The
attackers will then collect their credentials before forwarding them to the
legitimate Microsoft login portal.
A notable feature of this
campaign is that the phishing pages are hosted on Microsoft’s Azure cloud
services, so the URLs end with “windows.net.” As a result, even users who know
that they should inspect the top-level and second-level domains of the URL
could still fall for the scam. Azure-hosted sites are also secured with
Microsoft SSL certificates, increasing the appearance of authenticity.
Researchers
have discovered hundreds of phishing sites hosted on Azure and other cloud
services in the past month. While Microsoft takes these sites down as quickly
as it can, the sheer volume of malicious domains means that attackers usually
have several days to carry out their attacks. Additionally, when their sites
are shut down, they can easily set up more.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.