July 23, 2019 By David Bisson 2 min read

Phishers are launching campaigns that leverage fake Office 365 alerts to compromise administrator accounts.

In a campaign spotted by Bleeping Computer, fraudsters sent out fake admin alerts informing recipients that their organization’s Office 365 licenses had expired. The messages instructed recipients to click on a link so they could sign in to the Office 365 Admin Center and review their organization’s payment details. In reality, the link directed recipients to a phishing page designed to steal their administrator credentials.

Security researcher Michael Gillespie shared a similar attack with Bleeping Computer. In this campaign, fraudsters masqueraded as Office 365 representatives and used this disguise to inform recipients that someone had gained access to their admin accounts. The attack email prompted recipients to click on an “Investigate” button that, in turn, redirected them to a fake windows.net domain hosted on Azure. This tactic added greater legitimacy to the attack, as phishing pages hosted on Azure are secured using a Microsoft certificate.

A History of Fake Office 365 Alerts

This isn’t the first time cybercriminals have targeted Office 365. In May 2019, Bleeping Computer detected a phishing campaign that purported to come from the Office 365 team and warned recipients that their email account was slated for cancellation in an effort to steal their credentials. News of this attack came just two months before the computer security website spotted a fake Office 365 site that distributed the TrickBot infostealer disguised as Chrome and Firefox browser updates.

Given these attacks, it’s no wonder that 40 percent of organizations told Cyren and Osterman Research that digital attackers had succeeded in compromising enterprise Office 365 login credentials last year.

How to Defend Against Office 365-Based Attacks

Organizations can strengthen their defenses against attacks that leverage fake Office 365 alerts by conducting test phishing engagements to evaluate employees’ awareness of, and resilience against, social engineering attacks.

Security teams should also look to obtain phishing data that incorporates machine-deliverable threat intelligence, as this information provides indicators and impact ratings on which security professionals can act based upon their relevant risk.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today