Watch Out! New Phishing attack steals Office 365 credentials

Spread the love

Microsoft has just discovered a new phishing attack that bypasses their Microsoft Exchange basic authentication protocols. This new phishing campaign touts a file that the recipient must read pointing to a malicious link that takes victims to a lookalike Office 365 login page. Once the victim offers up their credentials a “file not found” message is displayed.

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, freezing of the system as part of a ransomware attack or revealing of sensitive information.

What is a BEC attack?

BEC (Business Email Compromise) is a phishing technique in which financially motivated cybercriminals trick unsuspecting executives and employees into making payments or sending sensitive data to fraudulent accounts. Attackers accomplish this by using a variety of techniques that manipulate users into sending money or data.

Business Email Compromise attacks are notoriously difficult to prevent. Rather than use malware, cybercriminals rely  on social engineering techniques and impersonation to trick people into acting on the attacker’s behalf.

Recent statistics from the FBI’s 2020 Internet Crime Report highlighted that there had been nearly 20,000 complaints of Business Email Compromise. In 2020, $1.86billion was the amount lost due to BEC attacks. Looking at the sophistication behind these attacks, it is clear that traditional threat detection solutions that analyse email headers, links and meta data is not enough to combat these attacks.

 

Types of Phishing attacks

Over the years, Cybercriminals have introduced new tactics to trick people into revealing sensitive information.  They have examined people’s behaviour and reliance on certain communication and data storage methods. Here are a couple of examples of how cybercriminals have tricked individuals into revealing sensitive information.

Tax Season Messages

During tax season, scammers send messages regarding tax issues. A common tactic used is providing a fake link for accessing your W-2s or other tax forms. However, by sending your tax form to a fraudster, you give them all the information they need to steal your identity.

Google doc/ Dropbox/ file-sharing notifications

There may have been instances where you’ve received a subject line “someone (name) has shared a Google Doc with you.” Within the body of the message is a fake link to the document or file. However, the link doesn’t take you to a file on Google Docs, Dropbox, or some other platform. On the contrary, it might link to a malware download.

FedEx/ UPS/ USPS shipping notification

Using a fake notification about a package, this message might say something like, “We could not deliver your item. Review and print your order’s complete shipping details.” The message may provide a link or have an attached file for download, neither of which are genuine.

Bank account or credit card concerns

This is a common type of message that cybercriminals use. The fraudulent message tells you that there’s an issue with your bank account or credit card account. You may be informed of irregular activity or suspicious charges, Or the message may simply request verification of your account details. You could be directed to a fake website and asked to enter your credentials. On the other hand, the message might also have a malicious attachment.

How to spot a Phishing attack ?

  1. Look for inconsistencies in links, addresses and domains.
    Phishing emails often have email addresses that are different than the name on the email account. They may also use domain names that appear to be slightly off in some way. Users can hover on a link to check the address before clicking – often times, links will lead to sites that have nothing to do with the purported sender’s domain.
  2. Watch out for bad spelling and grammar an unfamiliar language.
    Phishing attacks often originate in other countries – watching out for unfamiliar language or inaccurate spelling can help to identify phishing emails.
  3. Be suspicious of demands for urgent action.
    Phishing attacks often demand an urgent response and may even threaten recipients with negative consequences unless they respond immediately.
  4. Be wary of attachments.
    Be completely sure of a sender’s identity before opening any attachment, even from one that appears to be from a trusted source.

How to prevent Phishing Attacks?

  • Two-factor authentication (2FA)is the most effective method for countering phishing attacks, as it adds an extra verification layer when logging in to sensitive applications. 2FA relies on users having two things: something they know, such as a password and user name, and something they have, such as their smartphones. Even when employees are compromised, 2FA prevents the use of their compromised credentials, since these alone are insufficient to gain entry.
  • In addition to using 2FA, organizations should enforce strict password management policies. For example, employees should be required to frequently change their passwords and to not be allowed to reuse a password for multiple applications.
  • Always treat your email password like the keys to the kingdom, because that’s what it is for spammers.
  • Use a short phrase for a password (longer is better, and can be simpler) rather than just a few characters, and change it regularly.
  • Never share your email passwords unless you are logging in to your email provider’s website.
  • Never click on links in an email – always type the address directly into the address bar.
  • Keep your desktop AV, anti-spam, etc. up to date.

As the level of attacks increase, business owners cannot simply rely on anti-firewall and anti-virus solutions to block these threats. Instead, Business Owners need to proactively start looking at ways to train employees into keeping data secure. That’s where implement strong policies, and enrolling onto a Security awareness programme comes into place. These are low cost prevention tactics, which have a high impact on protecting the business.

 


Spread the love