• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Microsoft Warns of Sneaky Phishing Campaign

August 2, 2021 Zachary Comeau Leave a Comment

Phishing

Microsoft is warning of an active phishing campaign that uses a combination of techniques to evade detection and trick users into giving up their credentials.

In a series of Tweets and updates on GitHub, Microsoft’s security team says the active phishing campaign uses a “craft combination” of legitimate-looking original sender email addresses, spoofed display sender address that contain the target usernames and domains, and display names that look like legitimate services.

Used together, these techniques help the emails slip through filters.

An active phishing campaign is using a crafty combination of legitimate-looking original sender email addresses, spoofed display sender addresses that contain the target usernames and domains, and display names that mimic legitimate services to try and slip through email filters.

— Microsoft Security Intelligence (@MsftSecIntel) July 30, 2021

Microsoft says the original sender addresses contain variations of the word “referral” and use various top-level domains, “including the domain com[.]com, popularly used by phishing campaigns for spoofing and typo-squatting.”

The attackers use a SharePoint lure in the display name and in the message, which Microsoft says poses as a file share request for Staff Reports, Bonuses, Pricebooks and other content, with a link that navigate to the phishing page.

Phishing remains one of the most widely used tactics of delivering malware or stealing credentials, and these attacks are increasing, according to new Ivanti research that found 80% of IT professionals are seeing an increasing of phishing attempts.

In this particular phishing attack, the malicious email contains two URLS that have malformed HTTP headers, with a primary phishing URL that is a Google storage resource that points to an AppSpot domain requiring users to sign in before serving another Google User Content domain with an Office 365 phishing page, Microsoft says.

Another URL is located within the notification settings and brings users to a compromised SharePoint site that attackers use to make the email seem more legitimate. Both URLs require sign-in to continue to the final page, Microsoft says.

”These plus a load of other detection evasion techniques make this campaign even sneakier than usual, but Microsoft Defender for Office 365 detects and blocks these emails.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Microsoft, phishing

Related Content:

  • VuWall Enhances Operational Efficiency for SIMOS Control Center
  • Sony Projector Firmware Sony’s Latest Firmware Update Supports 21:9 Ultra-Wide Aspect…
  • IT Businessman makes an addition to process to increase its effectiveness. Changes system parameters for high productivity. Integration of improvements, updates and upgrades Now’s The Time to Focus on IT Productivity
  • AI Automation burnout What is It About AI That Brings Excitement,…

Free downloadable guide you may like:

  • Creating Great User Experience and Ultimate Flexibility with Clickshare

    Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When designing the office spaces – and meeting spaces in particular – enabling that connection between co-workers is crucial. Introducing the right collaboration technology in meeting spaces is the biggest challenge for IT managers […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Advertise with Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSDO NOT SELL MY PERSONAL INFORMATIONTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.