{"id":13321,"date":"2022-04-11T09:01:09","date_gmt":"2022-04-11T09:01:09","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?p=13321"},"modified":"2023-04-04T07:53:59","modified_gmt":"2023-04-04T07:53:59","slug":"important-message-from-it-sector-office-365-phishing","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/important-message-from-it-sector-office-365-phishing\/","title":{"rendered":"Important Message From IT Sector \u2013 Office 365 Phishing"},"content":{"rendered":"

We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated. It pretends to be a message from IT support to update webmail to use Office 365 \/ Outlook web access<\/p>\n

They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.<\/p>\n

The email looks like:<\/p>\n

From:<\/strong> IT Support <myersw.don@yahoo.com><\/p>\n

Date:<\/strong> Tue 28\/03\/2021 13:05<\/p>\n

Subjec<\/strong>t: Important message from IT Sector<\/p>\n

Attachment<\/strong>: Outlook 360.pdf<\/p>\n

Body Content:<\/strong><\/h3>\n

Dear User,<\/em><\/p>\n

Take note of this significant update that our new webmail has been improved with a new messaging system from Outlook Web Access which also include faster usage on email, shared calendar, web-documents and the new 2017 anti-spam version.<\/em><\/p>\n

Please check your attachment for your secure letter in PDF.<\/em><\/p>\n

Regards,<\/em><\/p>\n

IT Support<\/em><\/p>\n

This message and accompanying documents are covered by the Electronic Communications Privacy Act, 18 U.S.C. \u00a7\u00a7 2510-2521, and contain information intended for the specified individual(s) only. This information is confidential. If you are not the intended recipient or an agent responsible for delivering it to the intended recipient, you are at this moment notified that you have received this document in error and that any review, dissemination, copying or the taking of any action based on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message.<\/em><\/p>\n

Screenshot:<\/strong><\/h3>\n

This email has a genuine PDF attachment.<\/p>\n

If you follow the link inside the pdf you see a webpage looking like this: http:\/\/radioclassicafm.com.br\/lr\/barracuda\/barracuda\/index.html<\/p>\n

After you input your email address and password, you get told incorrect details and forwarded to an almost identical looking page where you can put it in again.<\/p>\n

Then you get sent to an imitation of the Google Verification page where they ask for either your phone number or alternative email address. I am sure the phisher must be a bit confused. Why would anybody verify a Microsoft Office 365 Account with Google. Microsoft have their own Verification system.<\/p>\n

Then you get a success page<\/p>\n

We all get very blas\u00e9 about phishing and think we know so much that we will never fall for a phishing attempt. Don\u2019t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says \u201cyou have won a prize\u201d or \u201csign up to this website for discounts, prizes and special offers\u201d<\/p>\n

Please read our How to protect yourselves page<\/a> for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\n

All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details.<\/p>\n

Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled<\/a>\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n","protected":false},"excerpt":{"rendered":"

We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated. It pretends to be a message from IT support to update webmail to use Office 365 \/ Outlook web access They use email addresses and subjects that will entice a user to…<\/p>\n","protected":false},"author":8,"featured_media":13401,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"default","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/phishing.jpg",1000,630,false],"author_info":{"display_name":"Darrel Heers","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/darrel-heers\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/13321"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=13321"}],"version-history":[{"count":1,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/13321\/revisions"}],"predecessor-version":[{"id":28552,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/13321\/revisions\/28552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13401"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=13321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}