NIST's guidance for a Zero Trust Architecture

Recent AD News

Microsoft-themed content used as bait for half of credential-swiping phishing attacks

In 2020, half of all phishing emails used Microsoft Office-themed content to lure in unsuspecting victims and swipe their credentials, according to a Tuesday report by Cofense. The company analyzed millions of attack-related emails and concluded that 57% of the mails were phishing emails with the intent to steal credentials, while the rest were used for planting malware in the user’s systems or as business email compromise (BEC) attacks.

Cofense researchers said that 45% of those phishing emails were Microsoft themed as they were banking on the increase in organizations migrating to Office 365. “With the number of organizations migrating to Office 365, targeting these credentials allows the threat actor to gain access to the organization as a legitimate user to go undetected,” the researchers from the company told Threatpost. They further went on to recommend the use of multi-factor authentication (MFA) to secure Microsoft Office logins.

The researchers also said that apart from Microsoft products and solutions that tie-in with Microsoft, other company names have also been used to lure in victims. “Other popular brands we observed asking for credentials were other various cloud hosting services such as Adobe, Dropbox, Box, DocuSign or WeTransfer,” the researchers said.

Related posts
Recent AD News

Automate access decisions with risk-based contextual authentication

Recent AD News

2020 recorded the highest number of CVE’s to ever be reported

Recent AD News

Microsoft announces Azure Best Practices and Launches Conditional Access Enhancements

Recent AD News

Accellion Zero-Days Responsible for Recent Data Theft and Extortion Attacks

Leave a Reply

Your email address will not be published. Required fields are marked *