NIST's guidance for a Zero Trust Architecture

Recent AD News

Attackers turn to fake reCAPTCHA to con Microsoft 365 users in a new phishing attack

Microsoft 365 users saw a slew of phishing emails, thanks to an ongoing attack aiming at stealing Microsoft 365 credentials. To make the emails look more realistic and legitimate, attackers are adding a fake Google reCAPTCHA system in addition to their company logos in the mails. Security researchers indicate that over 2500 such emails have been unsuccessfully sent to senior-level employees in the banking and IT sector, over the past three months.

These phishing emails first take the receiver to a fake Google reCAPTCHA page upon clicking a link in the mail. Once the recipient take the test, they are redirected to a bogus landing page from where their Microsoft 365 credentials are stolen. Another common method that attackers seem to apply is by sending senior members of an organization, emails about voicemail attachment. The modus operandi is similar in such attacks too.

Researchers are concerned that attackers are putting more work in to making the phishing attack look more legitimate and the landing pages fit the victim profile. The attacks are also targeting senior business leaders increasingly as such people have the most privileges and access to sensitive data.

Researchers also noted that most phishing pages associated with the campaign were hosted using generic top-level domains such as .xyz, .reset, and .online. These domains are usually used by cybercriminals in spam and phishing attacks owing to its cheap availability.

Related posts
Recent AD News

Automate access decisions with risk-based contextual authentication

Recent AD News

2020 recorded the highest number of CVE’s to ever be reported

Recent AD News

Microsoft announces Azure Best Practices and Launches Conditional Access Enhancements

Recent AD News

Accellion Zero-Days Responsible for Recent Data Theft and Extortion Attacks

Leave a Reply

Your email address will not be published. Required fields are marked *