www.armorblox.com
Open in
urlscan Pro
2a05:d014:275:cb00::c8
Public Scan
Submitted URL: https://em.armorblox.com/MTc2LVhNSi0wMzAAAAGK7NTd5CafuWNY7RU6d1r4s5oWJ1P_6wZlZjO21A9FNjH2iprpKv3YGxOk0LzwHxLbJsE3COg=
Effective URL: https://www.armorblox.com/blog/beware-of-dangerous-office-365-spear-phishing-tactics/?utm_medium=nurture&utm_source=email&...
Submission: On April 04 via api from US — Scanned from DE
Effective URL: https://www.armorblox.com/blog/beware-of-dangerous-office-365-spear-phishing-tactics/?utm_medium=nurture&utm_source=email&...
Submission: On April 04 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form id="mktoForm_1082" __bizdiag="196351835" __biza="W___" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" data-styles-ready="true">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol">
<div class="mktoOffset"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth">
<div class="mktoAsterix">*</div>Email:
</label>
<div class="mktoGutter mktoHasWidth"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true"
data-personalize-email="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple"><button type="submit" class="mktoButton" data-personalize-button="true">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1082"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="176-XMJ-030">
</form>
<form __bizdiag="119453422" __biza="W___" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Heading to RSA? Reserve your 1:1 Meeting with Armorblox! × Get a Demo * Product Product Capabilities * Product Overview * Advanced Threat Prevention * Advanced URL Protection * Advanced Malware Detection * Advanced Data Loss Prevention * Security Operations Product Tours * All Product Tours * Main Product Tour * Phishing Product Tour * Business Email Compromise Tour * Brand Impersonation Tour * Data Loss Prevention Product Tour * Vendor Compromise Tour * Security Operations Product Tour Integrations * Integrations and API Documentation * Incident Response Integrations * Platform Integrations * Solution By Use Case * Business Email Compromise * Email Account Compromise * Graymail and Recon Threats * Executive Phishing * Data Loss Prevention * Abuse Mailbox Remediation By Platform * Microsoft Office 365 * Google Workspace * Secure Email Gateway Augmentation By Industry * Financial Services * Education * Healthcare * Retail * Customers * Learn Analyst Validation * Armorblox Recognition * Analyst Recognition * Analyst Resources Learning Center * Explore All Topics * Business Email Compromise * Vendor Email Compromise * Spear Phishing * Ransomware * Vishing * Email DLP * Tools and Templates Resources * All Resources * Templates * Whitepapers * Solution Briefs * Datasheets * Videos * Webinars Blog * All Articles * News & Commentary * Threat Research * Product Features * Customer Success Stories Featured Content * Understanding your Organization’s Vendor Fraud and Supply Chain Risk * Protecting Your Organization Against Vendor Fraud and Supply Chain Attacks * Prevent Vendor and Supply Chain Attacks with Armorblox * Company * About Us * News * Careers * Contact Us * Pricing Get a Demo Back BEWARE OF THESE DANGEROUS OFFICE 365 SPEAR PHISHING TACTICS Written by Lauryn Cash News and Commentary / 12.22.21 Securing Office 365 email has been in the spotlight since Microsoft revealed that O365 users had been the targets of a spear phishing campaign in effect since July 2020. Is Microsoft Office 365 email secure? Since its inception, Office 365 has been an integral part of millions of businesses. However, its popularity has created a significant attack surface for threat actors who have continually changed their tactics to evade detection. Since cloud adoption has surged and Office 365 subscribers have increased to over 50.2 million, stopping phishing attacks on O365 has become increasingly important. Today we’ll look at four types of attacks that target Office 365 users: * Attacks that spoof workflows * Attacks that exploit business workflows * Attacks that impersonate well-known brands * Attacks that use unique techniques ATTACKS THAT SPOOF WORKFLOWS Attacks that spoof workflows duplicate existing workflows, fooling targets into believing they’ve received legitimate communications. These attacks are successful because they encourage victims to employ “System 1 thinking” – the brain’s automatic, intuitive approach to dealing with new situations. Unfortunately, when you “click before you think,” you open yourself up to being fooled by phony workflows you swear you’ve seen many times before. Here are three examples of attacks that spoof workflows. WELLS FARGO LOCKED ACCOUNT NOTIFICATION This email campaign impersonated a Wells Fargo locked account workflow to steal victims’ banking credentials. Variants of this email attack targeted over 10,000 customer inboxes. Microsoft skipped spam filtering because it determined that the email was from a safe sender to a safe recipient or was from an email source server on the IP Allow list. * Email security bypassed: Exchange Online Protection (EOP), Microsoft Defender for Office 365 (MSDO), Proofpoint * Techniques used: Social engineering, brand impersonation, replicating existing workflows, using Hotmail accounts FILE-SHARING NOTIFICATION FROM PROOFPOINT This credential phishing attack impersonated Proofpoint to steal victims’ Google and Microsoft logins, claiming to contain a secure file sent via Proofpoint as a link. Clicking the link took victims to a page that spoofed Proofpoint branding and contained login links for various email providers. Additionally, the attack included dedicated login page spoofs for Google and Microsoft. * Email security bypassed: Microsoft email security * Techniques used: Social engineering, brand impersonation, replicating existing workflows, account takeover ONLINE SHIPPING NOTIFICATIONS FROM FEDEX AND DHL This double attack impersonated a FedEx online document share and pretended to dispense shipping details from DHL Express. Both attacks aimed to extract victims’ work email account credentials. Phishing pages were hosted on free services like Quip and Google Firebase, tricking security technologies and users into thinking the links were legitimate. * Email security bypassed: Exchange Online Protection (EOP), Microsoft Defender for Office 365 * Techniques used: Social engineering, link redirects, hosting phishing pages on Quip and Google Firebase, brand impersonation 2. ATTACKS THAT EXPLOIT BUSINESS WORKFLOWS These attacks are successful because they use legitimate domains to create phishing emails and pages that target a business workflow. This tricks both security software and end users into believing the communication is legitimate. Here are three examples of attacks that exploit free software. HOSTING PHISHING PAGES ON GOOGLE FIREBASE This email attack, sent to at least 20,000 inboxes, pretended to share information about an EFT payment with a link to download an HTML invoice. Unfortunately, when the invoice was opened, the HTML loaded a page with Microsoft Office branding hosted on Google Firebase. The final phishing attempted to extract the victims’ Microsoft login credentials, alternate email addresses, and phone numbers. * Email security bypassed: Exchange Online Protection (EOP), Microsoft Defender for Office 365 * Techniques used: Social engineering, link redirects, HTML hosted on Google Firebase, brand impersonation HOSTING PHISHING PAGES ON BOX In this credential phishing attempt, attackers hosted a phishing site on Box. They sent an email claiming to come from a legitimate third-party vendor and included a link to a secure document. Clicking the link led readers to a page hosted on Box, followed by a credential phishing page that resembled the Office 365 login portal. * Email security bypassed: Microsoft email security * Techniques used: Social engineering, link redirects, brand impersonation PHISHING PAGES HOSTED ON WEBFLOW AND GOOGLE SITES This credential phishing attempt impersonated internal IT teams with an email asking readers to review a secure message sent over Microsoft Teams. Clicking the link led readers to a page designed to look like Microsoft Teams, followed by a credential phishing page that resembled the Office 365 login portal. * Email security bypassed: Microsoft email security * Techniques used: Social engineering, link redirects, brand impersonation 3. ATTACKS THAT IMPERSONATE WELL-KNOWN BRANDS Credential phishing is a type of cyberattack. Hackers attempt to steal user credentials by posing as a known or trusted entity in an email, instant message, or other written communication channel. A trusted entity can also be a well-known brand, not just a co-worker or vendor. Here are three examples of attacks that impersonated well-known brands. NETFLIX CREDENTIAL PHISHING In the Netflix credential phishing attempt, attackers sent an email resembling a Netflix billing failure. Clicking the email link took targets to a functioning CAPTCHA page with Netflix branding. Correctly filling in the CAPTCHA information led to a Netflix lookalike site, complete with a phishing flow that aimed to steal login credentials, billing address information, and credit card details. * Email security bypassed: Office 365 Exchange Online Protection * Techniques used: Social engineering, link redirects, brand impersonation, replicating existing workflows AMAZON CREDENTIAL PHISHING In an Amazon credential phishing attempt, attackers sent an email resembling an Amazon delivery order failure. However, the email came from a legitimate third-party vendor account and included a link to update Amazon billing information. Clicking on the link led victims to an Amazon lookalike site with a phishing flow that aimed to steal login credentials, billing address information, and credit card details. * Email security bypassed: Microsoft email security * Techniques used: Social engineering, link redirects, brand impersonation, replicating existing workflows BANK OF AMERICA CREDENTIAL PHISHING In the Bank of America credential phishing attempt, an email that impersonated B of A asked readers to update their email addresses to avoid getting recycled. Clicking a malicious link led readers to a credential phishing page that resembled the bank’s home page. The attack flow also included a page that asked readers for their ‘security challenge questions,’ both to get further identifying information from targets and increase legitimacy. * Email security bypassed: Microsoft email security * Techniques used: Social engineering, link redirects, brand impersonation, security challenge questions 4. ATTACKS THAT USE UNIQUE TECHNIQUES There seems to be no end to the creativity used by hackers to get what they want. Here are three unique techniques used by cybercriminals. REAL-TIME VALIDATION AGAINST ACTIVE DIRECTORY Cybercriminals validated stolen credentials in real-time when an executive at a top American business typed them into a malicious phishing page. After the user entered their Office 365 credentials into the page, the page called the Office 365 API to instantly verify the credentials against the organization’s Azure Active Directory infrastructure. * Email security bypassed: Microsoft email security * Techniques used: Social engineering, link redirects TECH SUPPORT VISHING ATTACKS In two billing/tech support vishing attacks against Geek Squad and Norton AntiVirus, hackers attempted to steal victims’ credit card details by sending fake order receipts and phone numbers to call for processing order returns. * Email security bypassed: Exchange Online Protection (EOP), Proofpoint * Techniques used: Social engineering, brand impersonation, replicating existing workflows, vishing (no URLs in email), using a Gmail address SYMANTEC URL REWRITING An email hid a zero-day phishing site behind multiple redirects, including one created using Symantec’s Click-time URL Protection tool for URL rewriting. The email was sent to an employee that focuses on real estate projects. It included a link to a PDF that seemed to contain bid details for an upcoming building project. However, clicking the link led victims through multiple redirects, including one created using Symantec’s Click Time Protection. The redirects culminated at a page that asked for login details. Again, all pages resembled legitimate OneDrive and Adobe pages in an attempt to pass the targets’ eye tests. * Email security bypassed: A spoof of Symantec email security * Techniques used: Social engineering, link redirects, brand impersonation SECURING OFFICE 365 EMAIL WITH ARMORBLOX As the examples cited in this article indicated, Microsoft native security features weren’t enough to protect users against various types of spear phishing attacks. Augmenting built-in controls with multilayered software like Armorblox adds email security solutions that protect your business and your human layer from fraud and sensitive data exposure. -------------------------------------------------------------------------------- LEARN HOW ARMORBLOX PROTECTS YOUR ORGANIZATION FROM PHISHING ATTACKS. Take Product Tour ARMORBLOGS Blogs from Armorblox. We couldn't resist the portmanteau. * Email: Subscribe Follow Us -------------------------------------------------------------------------------- READ THIS NEXT PEACE OF MIND FOR FINANCIAL ADVISORS: OUR WORK WITH FIDELITY INSTITUTIONAL News and Commentary / 9.16.21 YOU'VE GOT A PHISH PACKAGE: FEDEX AND DHL EXPRESS PHISHING ATTACKS Threat Research / 2.23.21 ADDRESSING EMAIL SECURITY'S FALSE POSITIVE PROBLEM News and Commentary / 2.2.22 CUSTOMER STORY: CUTTING THROUGH THE NOISE Customer Success Stories / 3.4.21 Armorblox secures enterprise communications over email and other cloud office applications with the power of Natural Language Understanding. The Armorblox platform connects over APIs and analyzes thousands of signals to understand the context of communications and protect people and data from compromise. Over 58,000 organizations use Armorblox to stop BEC and targeted phishing attacks, protect sensitive PII and PCI, and automate remediation of user-reported email threats. Armorblox was featured in the 2019 Forbes AI 50 list and was named a 2020 Gartner Cool Vendor in Cloud Office Security. Founded in 2017, Armorblox is headquartered in Sunnyvale, CA and backed by General Catalyst and Next47. * Product * Product Tour * Integrations * Solution * Business Email Compromise * Email Account Compromise * Graymail and Recon Threats * Executive Phishing * Email Data Loss Prevention * Abuse Mailbox Remediation * Armorblox * Customers * Resources * Blog * CONTEXT * Company * About Us * News * Careers * Trust Center * Contact Support -------------------------------------------------------------------------------- © 2023 Armorblox. All Rights Reserved. Privacy Policy. -------------------------------------------------------------------------------- Cookies Settings By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Privacy Policy Cookies Settings Reject All Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Cookies Details Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest Switch Label label Switch Label label Switch Label label * View Cookies * Name cookie name Reject All Confirm My Choices