August 5, 2020 By David Bisson 3 min read

A novel scam began when a user received an email impersonating a notification from Microsoft, Abnormal Security observed on Friday, July 17. The scam arrived after Microsoft had recently taken several steps to deter scammers. Security professionals should be aware of this attack’s methods when on the lookout for new possible problem vectors. 

The lookalike Microsoft webpage functioned as a submission form, prompting users to reveal their personal data, including their physical addresses and payment card information, in the text fields. In the first variant of the attack, a user received an email with the subject line “Reminder for Office Renewal.” This email informed the recipient that they had two days to renew their Office 365 subscription. It then instructed them to visit “office365family[dot]com,” a website hosted via Wix that used “Office 365” in its domain name to convince the user it was an official Microsoft page.

The website also used similar imagery to the official Microsoft website, replicated the Microsoft site’s footer and leveraged the same official links as the original. Even so, the landing page for this attack implemented different fonts and suffered from many broken header pages — signs it was a fake.

The second variant of the scam was similar to the first. It arrived with “Time to Renew” as its subject line. The email informed the user they had two days to renew their Office 365 subscription. However, this iteration didn’t send the recipient to a landing page. Instead, it used a “Renew Now” link to redirect the user to an authentic PayPal page where they could supposedly renew their subscription to Office 365.

The PayPal page listed “Microsoft Office 1 Year” as the item the user would be paying for. But, the page didn’t provide any additional proof of what the user was actually buying. When the user submitted their payment card credentials and completed the purchase, they sent over their funds not to Microsoft but to an unknown individual and subsequently received nothing in return.

Microsoft’s Ongoing Efforts to Deter Scammers

Microsoft recently added several options to cut down on scam messages in its products. In August 2019, for instance, the Verge covered the Redmond-based tech giant’s release of the SMS Organizer app for Android. This program automatically sorted all spam promotional SMS messages received by a user into a “promotions” folder, separating them from legitimate SMS messages.

Two months later, Bleeping Computer reported on the rollout of the new Office 365 feature called “Unverified Sender.” This feature displayed a notice to users when Office 365 spoof intelligence had failed to verify the sender of an incoming email message — a possible sign of bad activity. Additionally, Microsoft announced the public preview of “campaign views” in Office 365 Advanced Threat Protection at the beginning of December 2019. This component provided extra context and visibility into phishing campaigns that had targeted an organization and how their defenses had fared against those efforts.

Near the end of July 2020, Bleeping Computer helped to publicize a feature that first appeared in Microsoft Edge 84. Dubbed “Quiet Notification Requests,” the feature’s design is to help counter website permission requests spam by blocking notifications and Push APIs by default in the Edge browser.

How to Defend Against a Microsoft Renewal Email Scam

Security professionals can help defend their organizations against a Microsoft renewal email scam by investing in a security awareness training program and regularly testing employees’ familiarity with common phishing techniques, including the use of convincing attack domains for landing pages. They should complement this training with email security controls that use AI and machine learning to help spot the signs of a compromised email account, device or set of credentials.

More from

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today