Microsoft Office

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that’s even more difficult to identify. Here’s everything you need to know.

What makes it different from other scams?

The new threat comes in the form of spear phishing, an old familiar method in which hackers send emails that purport to be from trusted sources and dupe you into disclosing sensitive information. In this particular attack, the email messages are admirably well-crafted, making them even harder to spot.

The emails are also rid of the usual telltale signs such as misspelled words, suspicious attachments, and dubious requests. You might have to recalibrate what you know about phishing scams, because this new threat ticks all the boxes that make it look legitimate.

How does it work?

The hackers behind the attack craft personalized messages, pretending to be from trusted sources, such as your colleagues or Microsoft itself, and send them to your inbox. The messages could contain a link or a PDF file that leads to a legitimate-looking landing page. Upon clicking the link, the user will be prompted to enter his or her credentials, which the hacker will use to launch attacks within the organization.

Once they gain control of your account, they might set up new forwarding rules to monitor your communication patterns, which will be useful for their future attacks. They might even use your account to send further phishing emails to your co-workers to collect more sensitive information.

As for the phishing emails with PDF attachments, there will be instructions to fill in username and password to view the document. And once you do, your account is no longer yours.

Another way they can get your credentials is by sending an invoice that requires you to log on to a web portal to view the file. Attackers can also use this technique to trick you into performing a certain action, such as forwarding sensitive information or paying an invoice.

What can you do to stay protected?

Your first line of defense is multi-factor authentication, whereby you use a password and another authentication method — like an SMS code — to secure your account. This function is already included in Office 365 and here’s a step-by-step guide on how to activate it.

The second line of defense is training yourself and your employees to spot common phishing techniques. In particular, verify the accuracy of the wording and the sensibility of the requests in the messages.

For good measure, your organization can also install an email-validation system which is designed to detect and prevent email spoofing, such as the Domain-based Message Authentication, Reporting and Conformance (DMARC).

Identifying phishing emails and planning and implementing a robust defense system are ways to protect you and your organization against the new Office 365 threat. For tips on how to spot this type of scam and how to plan thorough security practices, contact our experts today.  Also, take a look at our Computer Network Security page to learn more or call us at 336-776-0060 to speak with one of our team about how to keep this from happening to you.  Call us today!

ron.pierce

Recent Posts

Small Business Cybersecurity: Protect Your Business Like a Pro

Imagine this... You wake up, grab your morning coffee, and check your email. There’s a…

3 days ago

How to Set Up Parental Controls on Your Devices

As children spend more time on devices, ensuring their online safety becomes vital. Parental controls…

5 days ago

The Ultimate Guide for CPAs: Choosing the Right Accounting Practice Software for Your Office

  Are You Making the Right Choice for Your CPA Firm? When was the last…

1 week ago

Implementing Screen Time Management Solutions in the Workplace

In today’s digital-first world, screen time is an unavoidable aspect of the modern workplace. Employees…

2 weeks ago

Simple Ways to Limit Screen Time for Your Family

Spending too much time in front of screens can affect how we feel and interact…

2 weeks ago

Preventing Email Phishing Attacks for Small Businesses: Essential Strategies

Every day, people receive emails pretending to be from trusted sources only to discover they…

2 weeks ago