• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Phishing Email Spoofs Microsoft Alert

Phishing Email Spoofs Microsoft Alert

2020-07-22 by Keith Harlock

Phishing Email Microsoft Alert

Cyberattack uses fake Microsoft alert to steal login credentials

Threat actors are sending phishing emails disguised as fake Microsoft Office account security alerts. The notification prompts the user to click on a link to review suspicious activity. If the target follows the instructions, their Microsoft Office account is compromised.

The Microsoft phishing email is crafted to look like a security notification. The subject line informs the reader that there has been a new sign in to their account. To make this attack more believable, the threat actor has spoofed the email domain of the target’s workplace and impersonated Microsoft.

The target is informed that there has been a new login to their Microsoft account. The messaging in the body of the phishing email looks like a typical new login alert – it lists an IP address of the new login and states that a Windows computer was used. The sender’s email address spoofs the victim’s corporate email, says a report by researchers at Abnormal Security. The messaging in the email attempts to scare the user and get them to act quickly to review this suspicious activity. They are instructed to click on a link to review their account.

Motley Fool Buy Sign
Motley Fool (Sponsored)

If the victim clicks on the link in the alert, they are taken to a credential phishing page which uses Microsoft branding and design – which it is not. The victim’s email address is already filled in – making it even easier and faster for the victim to make a mistake. The credential phishing page instructs the user to enter in the Microsoft password. If they do so, their credentials are sent to the hackers and their work account is compromised.

Employees who use Microsoft Office for their work email are frequent targets of cyberattacks. The hackers are looking to gain access to personal data and valuable corporate emails. Once an email account is compromised, the threat actors can then scan emails looking for sensitive work documents, to gain access to financial accounts, or access other private information.

MS Office Phishing Abnormal Security
MS Office Phishing Image: Abnormal Security

Business Email Compromise Scams

Hacked email accounts are used in Business Email Compromise (BEC) attacks. According the Federal Bureau of Investigations (FBI) BEC scams and accounted for $2.1 billion in losses between January 2014 and October 2019. The hacked email account can also be used to send more malicious emails to other employees with fraudulent requests for payment.

People often use the same username and password combination across multiple online accounts. Actor is able to get your password to your email account they can use that to log into other accounts using the very same password. The hacker can see from your emails what other online accounts you use. Even if you don’t use the same password, the threat actor has access to your email and can send password reset requests to your hacked email account.

How to Spot a Phishing Email

  1. The sending email address does not match the display name
  2. Read our guide on how to detect a phishing email
  3. Phishing email contain malicious links that are cloaked to hide the real landing page
  4. They may also contain malicious attachments
  5. Be highly suspicious of any email that urges you to act quickly
  6. Scrutinize the contents and links in the email. Rather than clicking on the links, go to the website in question directly using a web browser or call customer service

Filed Under: News Tagged With: Microsoft, phishing

About Keith Harlock

Keith has 30 years of experience managing staff for the planning and design of highway, bridge and transportation-related projects and specialty structures. Keith oversees the development of and authors numerous reports on a variety of topics related to transportation engineering and has worked with several key clients on projects related to infrastructure security. Keith is a licensed professional engineer in the State of New York, currently a State Board member of the American Council of Engineering Companies of New York and is a licensed commercial pilot with an instrument rating. He resides in Western New York.


LinkedInTwitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version