August 5, 2020 By David Bisson 3 min read

A novel scam began when a user received an email impersonating a notification from Microsoft, Abnormal Security observed on Friday, July 17. The scam arrived after Microsoft had recently taken several steps to deter scammers. Security professionals should be aware of this attack’s methods when on the lookout for new possible problem vectors. 

The lookalike Microsoft webpage functioned as a submission form, prompting users to reveal their personal data, including their physical addresses and payment card information, in the text fields. In the first variant of the attack, a user received an email with the subject line “Reminder for Office Renewal.” This email informed the recipient that they had two days to renew their Office 365 subscription. It then instructed them to visit “office365family[dot]com,” a website hosted via Wix that used “Office 365” in its domain name to convince the user it was an official Microsoft page.

The website also used similar imagery to the official Microsoft website, replicated the Microsoft site’s footer and leveraged the same official links as the original. Even so, the landing page for this attack implemented different fonts and suffered from many broken header pages — signs it was a fake.

The second variant of the scam was similar to the first. It arrived with “Time to Renew” as its subject line. The email informed the user they had two days to renew their Office 365 subscription. However, this iteration didn’t send the recipient to a landing page. Instead, it used a “Renew Now” link to redirect the user to an authentic PayPal page where they could supposedly renew their subscription to Office 365.

The PayPal page listed “Microsoft Office 1 Year” as the item the user would be paying for. But, the page didn’t provide any additional proof of what the user was actually buying. When the user submitted their payment card credentials and completed the purchase, they sent over their funds not to Microsoft but to an unknown individual and subsequently received nothing in return.

Microsoft’s Ongoing Efforts to Deter Scammers

Microsoft recently added several options to cut down on scam messages in its products. In August 2019, for instance, the Verge covered the Redmond-based tech giant’s release of the SMS Organizer app for Android. This program automatically sorted all spam promotional SMS messages received by a user into a “promotions” folder, separating them from legitimate SMS messages.

Two months later, Bleeping Computer reported on the rollout of the new Office 365 feature called “Unverified Sender.” This feature displayed a notice to users when Office 365 spoof intelligence had failed to verify the sender of an incoming email message — a possible sign of bad activity. Additionally, Microsoft announced the public preview of “campaign views” in Office 365 Advanced Threat Protection at the beginning of December 2019. This component provided extra context and visibility into phishing campaigns that had targeted an organization and how their defenses had fared against those efforts.

Near the end of July 2020, Bleeping Computer helped to publicize a feature that first appeared in Microsoft Edge 84. Dubbed “Quiet Notification Requests,” the feature’s design is to help counter website permission requests spam by blocking notifications and Push APIs by default in the Edge browser.

How to Defend Against a Microsoft Renewal Email Scam

Security professionals can help defend their organizations against a Microsoft renewal email scam by investing in a security awareness training program and regularly testing employees’ familiarity with common phishing techniques, including the use of convincing attack domains for landing pages. They should complement this training with email security controls that use AI and machine learning to help spot the signs of a compromised email account, device or set of credentials.

More from

ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive?

2 min read - After reading about the recent cybersecurity research by Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang, I had questions. While initially impressed that ChatGPT 4 can exploit the vast majority of one-day vulnerabilities, I started thinking about what the results really mean in the grand scheme of cybersecurity. Most importantly, I wondered how a human cybersecurity professional’s results for the same tasks would compare.To get some answers, I talked with Shanchieh Yang, Director of Research at the Rochester Institute…

ONCD releases request for information: Open-source software security

3 min read - Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working on the coding, security measures are often overlooked, increasing the chances that a vulnerability will fall through the cracks and be exploited. The Open-Source Software Security Initiative (OS31) aims to provide governance over open-source security processes. After the Log4Shell vulnerability, securing open-source software became a top priority for the federal…

How cyber criminals are compromising AI software supply chains

3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important.Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to be a hacktivist organization motivated by an anti-AI cause, specifically targets these resources to poison data sets used in AI model training.No matter whether you use…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today