Microsoft is a big target for hackers, and it seems that they have recently come up with two new and novel phishing attack methods to go after the company’s customers. And the thing that makes these phishing tactics so scary, is that they bypass traditional security measures.

The first of these phishing attacks, reported by Latest Hacking News, uses a local login form to bypass security. The attack starts with “an email notifying users about a ‘copy of payment notification’.” The email doesn’t say much, but does contain an HTML attachment.

The HTML attachment is what makes this phishing attack unique. “Unlike most HTML code in phishing attacks that redirect users to phishing websites, the one in this attack behaved differently. Opening the attachment displayed a login page as a pop-up.”

The login page looks like a Microsoft page, but of course it’s not. It’s a phishing page designed to steal credentials. And what make is so hard to detect is the page is actually embedded right in the email and not on some malicious server somewhere. This is a really clever phishing exploit and one that is hard to detect.

The other phishing attack, reported by PhishLabs, “uses a malicious Microsoft Office 365 App to gain access to a victim’s account without requiring them to give up their credentials to the attackers.” Talk about hard to detect.

As detailed by PhishLabs, “In this technique, the attacker sends a traditional phishing message impersonating an internal SharePoint and OneDrive file-share that uses social engineering to coerce the victim into clicking an embedded link. The lure itself is nothing special. The threat actor uses the credibility of a commonly seen business process, which disarms the victim.”

So, what’s so clever about this exploit? It takes advantage of the fact that Office 365 allows add-ins and apps to be installed to ostensibly increase the utility of the various Office 365 applications. This particular exploit is nothing more than presenting the user with an opportunity to install an Office 365 add-in. An add-in that “grants full control of your Office 365 account to the attacker. This is everything from granting access to your inbox, your contacts, and any files you have access to on OneDrive.”

What makes it even worse is that “Microsoft allows Office 365 Add-Ins and Apps to be installed via side loading without going through the Office Store, and thereby avoiding any review process. This means that a threat actor can deliver a malicious app from the infrastructure that they control to any user that clicks a URL and approves the requested permissions. In this case, the result is complete control over your Office 365 Account.”

If you use Office 365, like many people do, whether you know it or not, you are under constant attack from very clever hackers exploiting all the weaknesses in the Microsoft ecosystem. You simply cannot protect yourself from every possible Microsoft exploit. You’re going to need some help.

Meet some help

Phishing Protection from DuoCircle.com. It protects you from all the advanced phishing attacks on Office 365, including the two newest ones covered here, by using real-time link click protection. With real-time link click protection, every time you click on an embedded link or open an attachment, before the action can be completed, Phishing Protection makes sure it’s legitimate. And if it isn’t, it blocks it and keeps you safe.

Cloud-based Phishing Protection doesn’t require any hardware, software or maintenance. It sets up in 10 minutes, comes with 24/7 live tech support and only costs pennies per user per month. The Office 365 attacks are not going to stop. Only you can protect yourself. Protect yourself with Phishing Protection from DuoCircle.

Pin It on Pinterest

Share This