A novel scam began when a user received an email impersonating a notification from Microsoft, Abnormal Security observed on Friday, July 17. The scam arrived after Microsoft had recently taken several steps to deter scammers. Security professionals should be aware of this attack’s methods when on the lookout for new possible problem vectors.
The lookalike Microsoft webpage functioned as a submission form, prompting users to reveal their personal data, including their physical addresses and payment card information, in the text fields. In the first variant of the attack, a user received an email with the subject line “Reminder for Office Renewal.” This email informed the recipient that they had two days to renew their Office 365 subscription. It then instructed them to visit “office365family[dot]com,” a website hosted via Wix that used “Office 365” in its domain name to convince the user it was an official Microsoft page.
The website also used similar imagery to the official Microsoft website, replicated the Microsoft site’s footer and leveraged the same official links as the original. Even so, the landing page for this attack implemented different fonts and suffered from many broken header pages — signs it was a fake.
The second variant of the scam was similar to the first. It arrived with “Time to Renew” as its subject line. The email informed the user they had two days to renew their Office 365 subscription. However, this iteration didn’t send the recipient to a landing page. Instead, it used a “Renew Now” link to redirect the user to an authentic PayPal page where they could supposedly renew their subscription to Office 365.
The PayPal page listed “Microsoft Office 1 Year” as the item the user would be paying for. But, the page didn’t provide any additional proof of what the user was actually buying. When the user submitted their payment card credentials and completed the purchase, they sent over their funds not to Microsoft but to an unknown individual and subsequently received nothing in return.
Microsoft’s Ongoing Efforts to Deter Scammers
Microsoft recently added several options to cut down on scam messages in its products. In August 2019, for instance, the Verge covered the Redmond-based tech giant’s release of the SMS Organizer app for Android. This program automatically sorted all spam promotional SMS messages received by a user into a “promotions” folder, separating them from legitimate SMS messages.
Two months later, Bleeping Computer reported on the rollout of the new Office 365 feature called “Unverified Sender.” This feature displayed a notice to users when Office 365 spoof intelligence had failed to verify the sender of an incoming email message — a possible sign of bad activity. Additionally, Microsoft announced the public preview of “campaign views” in Office 365 Advanced Threat Protection at the beginning of December 2019. This component provided extra context and visibility into phishing campaigns that had targeted an organization and how their defenses had fared against those efforts.
Near the end of July 2020, Bleeping Computer helped to publicize a feature that first appeared in Microsoft Edge 84. Dubbed “Quiet Notification Requests,” the feature’s design is to help counter website permission requests spam by blocking notifications and Push APIs by default in the Edge browser.
How to Defend Against a Microsoft Renewal Email Scam
Security professionals can help defend their organizations against a Microsoft renewal email scam by investing in a security awareness training program and regularly testing employees’ familiarity with common phishing techniques, including the use of convincing attack domains for landing pages. They should complement this training with email security controls that use AI and machine learning to help spot the signs of a compromised email account, device or set of credentials.