August 14, 2019 By David Bisson 2 min read

Cyberattackers are passing around fake Microsoft account emails under the pretense of “unusual sign-in activity” to trick users into handing over their credentials.

Bleeping Computer spotted the phishing emails and noted that the actors took their time to make the messages look convincing. According to the researchers, the emails arrived with the same look and information fields as official Microsoft notifications and came with the same sender email address — [email protected] — as the one used in legitimate Microsoft correspondence.

Clicking the “Review recent activity” link redirected users to a fake Microsoft landing page designed to steal their credentials. After the page saved the submitted details, it directed victims to an error page on Microsoft’s Outlook support site. According to the researchers, the bad actors likely aimed to trick users into thinking there was a problem with their account and that nothing suspicious had happened.

A History of Phishing for Microsoft Details

Cybercriminals have targeted users’ Microsoft credentials many times in the past. In December 2018, for instance, the SANS Internet Storm Center detected a phishing attack that used emails disguised as nondelivery receipts sent from Microsoft Office 365.

Several months later, Bleeping Computer observed an operation in which phishing emails claimed the Office 365 team had detected a large number of file deletions on their account. The computer help site reported another phishing campaign in early July; this time, the attack emails lured victims with a fake notification about a new audio message from a contact in their address book.

Protect Your Users From Fake Microsoft Account Emails

One effective way to protect your organizations from fake Microsoft account emails is by using ahead-of-threat detection to flag suspicious domains before phishers can use them for their campaigns. This technique should be part of a layered approach to email security that includes security information and event management (SIEM), mail scanning services, perimeter protection and other measures.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today