https://ift.tt/I2Q70Wy AI Coding Agents Are Redefining Cyber Risk — Is Your Exposure Strategy Ready?
https://ift.tt/I2Q70Wy AI Coding Agents Are Redefining Cyber Risk — Is Your Exposure Strategy Ready?
- Get link
- X
- Other Apps
Cybercriminals are increasingly using Microsoft Office Forms to launch sophisticated two-step phishing attacks. At present, certain individuals are being tricked into divulging their Microsoft 365 (M365) login information through Office Forms.
Threat actors use the technique known as “external account takeover” or vendor email compromise to launch two-step phishing attacks throughout supply chains, using the email addresses of compromised business partners and vendors.
“The attack originates from compromised legitimate accounts, making it difficult for email security solutions to flag the emails as malicious”, Perception Point’s security research team shared with Cyber Security News.
To See the real-time advanced threats in your inbox, leading email security firms like Trustifi will show you the threats that may have evaded your existing email protection. You can try a complimentary ThreatScan.
Using Microsoft Office Forms, attackers design forms that appear legitimate while hiding harmful links within them.
Then, in an attempt to impersonate reputable websites and brands like Adobe or Microsoft Sharepoint document viewer, these forms are bulk-emailed to targets pretending to be legitimate requests like password changes or access to critical documents.
The form asks the user to click a link to view the document and complete the questionnaire; it looks to be authentic and is located on a reliable website.
Here is an email with a link to a Microsoft Office form sent to the victim.
Malicious URL disguised as a necessary step for M365 authentication on Office Form When a user clicks the link, they are taken to a fake login page, such as an Adobe or Microsoft 365 account page, intended to collect login credentials.
According to the Perception Point report, Attackers use well-known favicons and enticing page titles to increase the legitimacy of their forms. Favicons are small icons that appear in the browser tab, and by exploiting Microsoft-related icons, attackers boost the apparent authenticity of their fake pages.
With the legitimate https://ift.tt/cWGSqCi URL, the attackers can create a convincing “look and feel” of a Microsoft page.
This is a two-step phishing attack since the attacker first exploits the well-known websites Office Forms, Canva, and several others for their benefit.
Step two is when the user clicks on another link on the legitimate website, which takes them to a fake page where credentials are being stolen.
An additional variation detected by Perception Point mimics Adobe on the two step’s phishing login page.
Researchers recommended an advanced object detection model to thwart phishing attacks that involve two steps. This model mimics the victim’s engagement by screenshotting every webpage and identifying clickable elements.
This method ensures that any malicious payload is identified and prevented in later stages, even if the original link seems harmless.
Two-Step Phishing attacks evade detection by using compromised legitimate accounts, which makes it hard for email security solutions to recognize the emails as malicious.
Recipients are more likely to trust and interact with emails from familiar senders. Initially, the link in the email directs to a reputable website, which helps bypass security filters.
The malicious activity is only revealed in the second stage, where the phishing attempt occurs, increasing the attack’s chances of success.
Users should exercise caution when receiving emails that ask for their credentials to protect themselves from this phishing campaign. Here are a few suggestions to ensure your safety:
Download Free Cybersecurity Planning Checklist 2024 (PDF) – Download Here
The post Hackers Abuse Microsoft Office Forms to Launch Two-Step Phishing Attacks appeared first on Cyber Security News.
https://ift.tt/QHb7Acx
Comments
Post a Comment
Commenter vous !