Microsoft 365 phishing

Explanation

The goal of this phishing campaign is to steal Microsoft 365 credentials. The distribution happens via email; according to our knowledge mainly by compromised accounts.

In the message itself, there is an embedded image, which contains a blurry view of a supposedly relevant document. By clicking on that image, the respective PDF documents should allegedly be displayed. In reality, the user is redirected to a malicious website, for which there are several variants.

If one clicks on the URL on that page, one gets redirected to a page under another domain, where Cloudflare’s human verification-step must be carried out first. Next, after a supposed sign-in initiation process, the user is asked to enter their username. Here, the phone number or Skype account linked to the Microsoft account can also be used. Subsequently, the password is requested. If one clicks on “Forgot your password?”, the email address associated with the previously entered account will be extracted from Microsoft and displayed. In this case, a password reset could indeed be carried out; however, the attacker can intercept the data in the process.

Note: The overall approach and appearance of the individual pages may deviate slightly from the previously described.

The following malicious domains were observed in the context of this phishing campaign:

  • bolder-machine-9ae.notion[.]site
  • honest-falcon-p5wdmk.mystrikingly[.]com
  • *.0365docsviewer[.]com
  • lavender-carnation-pb9ctx.mystrikingly[.]com
  • *.notionshare365[.]com
  • officefilescloudstoragesystem[.]com
  • pdfhubo365[.]com
  • purplish-raccoon-p7klkt.mystrikingly[.]com

Example

email landing_page cloudflare sign_in login_username login_password reset

0x00

Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).

If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

0x01

Plus d'exemples de phishing

Voir toutes les publications