blog.checkpoint.com Open in urlscan Pro
18.173.205.29  Public Scan

Submitted URL: https://click.checkpoint.com/NzUwLURRSC01MjgAAAGWNMLxRaExx8vn9m-KUGRpGO-cT98Jon9rJC-B0U6qT8dIhfu0uB-g2sTQ9FYHfsIjfyMbqxQ=
Effective URL: https://blog.checkpoint.com/harmony-email/5000-fake-microsoft-emails-that-your-employees-could-fall-for/?utm_source=newslett...
Submission: On October 16 via api from CH — Scanned from CH

Form analysis 3 forms found in the DOM

<form id="search-form">
  <input type="image" src="https://www.checkpoint.com/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq" name="stq" class="st-search-input" placeholder="Enter your keywords..."
    x-webkit-speech="" x-webkit-grammar="builtin:search" autocomplete="off" aria-label="Search Term">
</form>

<form id="search-form1">
  <label style="display: none;">Search</label>
  <input type="image" src="https://www.checkpoint.com/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq1" name="stq1" class="st-search-input" placeholder="Enter your keywords..."
    x-webkit-speech="" x-webkit-grammar="builtin:search" autocomplete="off" aria-label="Search Term">
</form>

GET /

<form action="/" id="searchform" class="search-form" method="get">
  <div class="form-group">
    <input type="search" name="s" class="search-form__input" autocomplete="off" placeholder="Search ...">
    <button type="submit" class="btn search-form__submit"><i class="atbs-atoms-icon-right-arrow"></i></button>
  </div>
</form>

Text Content

Get a Demo Contact Us Support Log In
 * Search
   * 
 * Geo Menu
   * * Choose your language...
     * English (English)
     * Spanish (Español)
     * French (Français)
     * German (Deutsch)
     * Italian (Italiano)
     * Portuguese (Português)
     * Japanese (日本語)
     * Chinese (中文)
     * Korean (한국어)
     * Taiwan (繁體中文)

 * Solutions
   * * Use Cases
     * Industry
     * Organization Size
     
     * Hybrid Cloud
     * Zero Trust & Least Privilege
     * Developer Security & Operations
     * IoT Security Solutions
     * Anti-Ransomware
     * SD-WAN
     
     SEE HOW USE CASES COME TO LIFE THROUGH CHECK POINT'S CUSTOMER STORIES.
     
     Learn More
     
     
     * Retail
     * Financial Services
     * Federal Government
     * State & Local Government
     * Healthcare
     * Telco Service Provider
     * Education
     
     SEE HOW USE CASES COME TO LIFE THROUGH CHECK POINT'S CUSTOMER STORIES.
     
     Learn More
     
     
     * Enterprise
     * Small & Medium Business
     
     SEE HOW USE CASES COME TO LIFE THROUGH CHECK POINT'S CUSTOMER STORIES.
     
     Learn More
     
 * Platform
   * * Infinity Platform
     * Secure the Network
     * Secure the Cloud
     * Secure the Workspace
     * Security Operations and AI
     
     Explore Infinity
     * Platform Overview
     * Infinity Core Services
     * Infinity PortalAccess Infinity Portal
     * Infinity Platform AgreementPredictable cyber-security environments
       through a platform agreement
     
     AI-POWERED THREAT PREVENTION
     
     Learn More
     
     
     Explore Quantum
     * Next Generation Firewall (NGFW) Security GatewayIndustry-leading AI
       powered security gateways for modern enterprises
     * SD-WANSoftware Defined Wide Area networks converging security with
       networking
     * Security Policy and Threat ManagementManage firewall and security policy
       on a unified platform for on-premises and cloud networks
     * Operational Technology and Internet of Things (IoT) Autonomous IoT/OT
       threat prevention with zero-trust profiling, virtual patching and
       segmentation
     * Remote Access VPN Secure, seamless remote access to corporate networks
     
     AI-POWERED THREAT PREVENTION
     
     Learn More
     
     
     Explore CloudGuard
     * Cloud Network Security Industry-leading threat prevention through
       cloud-native firewalls
     * Cloud Native Application Protection PlatformCloud native prevention first
       security
     * Code SecurityDeveloper centric code security
     * Web Application and API SecurityAutomated application and API security
     
     AI-POWERED THREAT PREVENTION
     
     Learn More
     
     
     Explore Harmony
     * Email and Collaboration SecurityEmail security including office &
       collaboration apps
     * Endpoint SecurityComprehensive endpoint protection to prevent attacks &
       data compromise
     * Mobile SecurityComplete protection for the mobile workforce across all
       mobile devices
     * SASEUnifying security with optimized internet and network connectivity
     
     AI-POWERED THREAT PREVENTION
     
     Learn More
     
     
     Security Operations and AI
     * Managed Prevention & Response ServiceSOC operations as a service with
       Infinty MDR/MPR
     * Extended Prevention & ResponseAI-Powered, Cloud-Delivered Security
       Operations with Infinity XDR/XPR
     * Secure Automation and CollaborationAutomate response playbooks with
       Infinity Playblocks
     * Unified Security Events and Logs as a ServiceInfinity Events cloud-based
       analysis, monitoring and reporting
     * AI Powered TeammateAutomated Security Admin & Incident Response with AI
       Copilot
     * ThreatCloud AIThe Brain behind Check Point’s threat prevention
     
     AI-POWERED THREAT PREVENTION
     
     Learn More
     
 * Support & Services
   * * Assess
     * Transform
     * Master
     * Respond
     * Manage
     * Support
     
     Explore Assess Services
     * Cyber Security Risk AssessmentAssess cyber security maturity and plan
       actionable goals
     * Penetration TestingEvaluate security defenses against potential cyber
       attacks and threats
     * Security Controls Gap Analysis
       (NIST CIST)Analyze technology gaps and plan solutions for improved
       security and ROI
     * Threat IntelligenceAnalyzed data on cyber threats, aiding proactive
       security measures
     * See All Infinity Global Services >
     
     LEARN HACKERS INSIDE SECRETS AND BEAT THEM AT THEIR OWN GAME
     
     View Courses
     
     
     Explore Transform Services
     * Security Deployment & OptimizationStrategic deployment and refinement of
       security for optimal protection
     * Advanced Technical Account ManagementProactive service delivered by
       highly skilled Cyber Security professionals
     * Lifecycle Management ServicesEffectively maintain the lifecycle of
       security products and services
     * See All Infinity Global Services >
     
     LEARN HACKERS INSIDE SECRETS AND BEAT THEM AT THEIR OWN GAME
     
     View Courses
     
     
     Explore Master Services
     * Certifications & AccreditationsComprehensive cyber security training and
       certification programs
     * CISO TrainingGlobally recognized training for Chief Information Security
       Officers
     * Security AwarenessEmpower employees with cyber security skills for work
       and home
     * Cyber RangeSimulated gamification environment for security training
     * MindCheck Point Cyber Security and Awareness Programs training hub
     * See All Infinity Global Services >
     
     LEARN HACKERS INSIDE SECRETS AND BEAT THEM AT THEIR OWN GAME
     
     View Courses
     
     
     Explore Respond Services
     * Incident ResponseManage and mitigate security incidents with systematic
       response services
     * Managed Detection and ResponsePrioritize prevention, delivering
       comprehensive SOC operations as a service
     * Digital ForensicsComprehensive investigation and analysis of cyber
       incidents and attacks
     * See All Infinity Global Services >
     
     LEARN HACKERS INSIDE SECRETS AND BEAT THEM AT THEIR OWN GAME
     
     View Courses
     
     
     Explore Manage Services
     * MXDR with Managed SIEM
     * Managed Firewalls
     * EDR with Agent Management
     * Managed CNAPP
     * Managed CSPM
     * See All Infinity Global Services >
     
     LEARN HACKERS INSIDE SECRETS AND BEAT THEM AT THEIR OWN GAME
     
     View Courses
     
     
     Explore Support Services
     * Support ProgramsPrograms designed to help maximize security technology
       utilization
     * Check Point PROProactive monitoring of infrastructure program offerings
     * Contact Support
     
     LEARN HACKERS INSIDE SECRETS AND BEAT THEM AT THEIR OWN GAME
     
     View Courses
     
   
 * Solutions
   * Use Cases
     * Hybrid Cloud
     * Zero Trust & Least Privilege
     * Developer Security & Operations
     * IoT Security Solutions
     * Anti-Ransomware
     * SD-WAN
   * Industy
     * Retail
     * Financial Services
     * Federal Government
     * State & Local Government
     * Healthcare
     * Telco Service Provider
     * Education
   * Organization Size
     * Enterprise
     * Small & Medium Business
   
   
 * Platform
   * Infinity Platform
     * Platform Overview
     * Infinity Core Services
     * Infinity Portal
     * Infinity Platform Agreement
   * Secure the Network
     * Next Generation Firewall (NGFW) Security Gateway
     * SD-WAN
     * Security Policy and Threat Management
     * Operational Technology and Internet of Things (IoT)
     * Remote Access VPN
   * Secure the Cloud
     * Cloud Network Security
     * Cloud Native Application Protection Platform
     * Code Security
     * Web Application and API Security
   * Secure the Workspace
     * Email and Collaboration Security
     * Endpoint Security
     * Mobile Security
     * SASE
   * Security Operations and AI
     * Managed Prevention & Response Service
     * Extended Prevention & Response
     * Secure Automation and Collaboration
     * Unified Security Events and Logs as a Service
     * AI Powered Teammate
     * ThreatCloud AI
   
   
 * Support & Services
   * Assess
     * Cyber Security Risk Assessment
     * Penetration Testing
     * Security Controls Gap Analysis (NIST CIST)
     * Threat Intelligence
   * Transform
     * Security Deployment & Optimization
     * Advanced Technical Account Management
     * Lifecycle Management Services
   * Master
     * Certifications & Accreditations
     * CISO Training
     * Security Awareness
     * Cyber Range
     * Mind
   * Respond
     * Incident Response
     * Managed Detection and Response
     * Digital Forensics
   * Manage
     * MXDR with Managed SIEM
     * Managed Firewalls
     * EDR with Agent Management
     * Managed CNAPP
     * Managed CSPM
   * Support
     * Support Programs
     * Check Point PRO
     * Contact Support
   
 * Partners
   * Check Point Partners
     * Find a Partner
     * Channel Partners
     * Technology Partners
     * MSSP Partners
     * AWS Cloud
     * Azure Cloud
   * Become a Partner
     * Overview
   * Enrolled Partners
     * Partner Portal
   
   * CHECK POINT IS 100% CHANNEL. GROW YOUR BUSINESS WITH US!
     
     Sign Up Now
 * More
   * Company
     * Company
     * Leadership
     * Careers
     * Investor Relations
     * Newsroom
   * Learn
     * Resource Center
     * Customer Stories
     * Blog
     * Events & Webinars
     * Cyber Hub
   * Cyber Security Insights
     * Check Point Research
     * CheckMates Community
   
   * SEE HOW USE CASES COME TO LIFE THROUGH CHECK POINT'S CUSTOMER STORIES.
     
     Learn More

 * Search
   * Search
 * Geo Menu
   * Choose your language...
   * English (English)
   * Spanish (Español)
   * French (Français)
   * German (Deutsch)
   * Italian (Italiano)
   * Portuguese (Português)
   * Japanese (日本語)
   * Chinese (中文)
   * Korean (한국어)
   * Taiwan (繁體中文)

Toggle Navigation

Blog Home > Harmony Email > 5,000 Fake Microsoft Emails that Your Employees
Could Fall For
Filter by: Select category Research  (585) Security  (954) Securing the
Cloud  (311) Harmony  (190) Company and Culture  (35) Innovation  (6) Customer
Stories  (13) Infinity Security Operations  (5) Securing the Network  (13)
Partners  (10) Connect SASE  (10) Harmony Email  (94) Artificial
Intelligence  (24) Infinity Global Services  (20) Crypto  (13) Healthcare  (14)
Harmony SASE  (6) MSSP  (3) Executive Insights  (229)
Harmony EmailOctober 2, 2024


5,000 FAKE MICROSOFT EMAILS THAT YOUR EMPLOYEES COULD FALL FOR

ByCheck Point Team
Share
 * 
 * 
 * 
 * 
 * 

EXECUTIVE SUMMARY:

In the technology sector, Microsoft stands out as the one of the most frequently
impersonated brands. Scammers commonly pose as Microsoft employees or affiliated
vendors, deceiving email recipients. According to the latest research findings
from Harmony Email & Collaboration, this trend is accelerating.

--------------------------------------------------------------------------------

MORE THAN 5,000 SPOOFED MICROSOFT NOTIFICATIONS HAVE BEEN IDENTIFIED BY HARMONY
EMAIL & COLLABORATION’S CYBER SECURITY RESEARCHERS.

--------------------------------------------------------------------------------

Across the past month, Harmony Email & Collaboration’s cyber security
researchers have caught over 5,000 emails masquerading as Microsoft
notifications. The emails utilize exceptionally sophisticated obfuscation
techniques, rendering it nearly impossible for users to distinguish them from
legitimate communications.

The business implications are significant, as email compromise could lead to
email account takeover, ransomware, information theft or other negative
outcomes.

What’s happening

The fake Microsoft emails don’t originate from private or unknown domains — a
clue that the emails are potential threats. Rather, the emails appear to come
from organizational domains impersonating legitimate administrators.

The main portion of a given email will typically include a fake login page or
portal, where malicious content may be hidden. An unsuspecting user can easily
click on this and input sensitive information or download a threat.

To hide the malicious intent of these emails, cyber criminals are deploying
sophisticated obfuscation techniques. Some emails include copied-and-pasted
Microsoft privacy policy statements, contributing to an authentic ‘look and
feel’.

Other emails have links to Microsoft or Bing pages, making it even more
challenging for traditional security systems to recognize and mitigate these
threats effectively.

Example

In the email shown below, a cyber criminal has spoofed a Microsoft email and
also impersonated an organization’s business administrator, sending a (fake)
email on the administrator’s behalf.

The email looks believable. In particular, the style of the email is so
duplicative of what users generally receive that a given user would have no
reason to flag it.

The language is perfect. The style is familiar. The graphics look impeccable.
So, what should organizations do?



Mitigations

There are measures that organizations can take to sidestep these email-based
threats. They include:

 1. User awareness training. This requires a mention, although generative
    AI-based text means that users can no longer rely on grammatical errors and
    stylistic inconsistencies as primary indicators of social engineering.
 2. AI-powered email security. This stops the full spectrum of inbox incursions.
    AI-powered email security tools leverage behavioral analysis and machine
    learning in order to prevent email spoofing, phishing, BEC threats and more.
 3. Software patching. Organizations should keep all software up-to-date, as to
    prevent cyber criminals from exploiting any bugs that could allow for easy
    email spoofing or disruption.

Keep following our blog for the latest email threat research. To speak with
someone about full-suite security for cloud email/collaboration tools, including
Microsoft’s products, contact us here.

 

0 1225


YOU MAY ALSO LIKE

Harmony Email September 19, 2024


NEW PHISHING CAMPAIGN EXPLOITING GOOGLE APP SCRIPTS: WHAT ORGANIZATIONS NEED TO
KNOW

Check Point Harmony Email Researchers have recently identified a concerning ...
Harmony Email June 12, 2024


THE EVOLUTION OF QR CODE PHISHING: ASCII-BASED QR CODES

Introduction Quishing—QR code phishing—is a rapidly evolving threat. Starting
around ...
Harmony Email May 28, 2024


FROM PHISH TO PHISH PHISHING: HOW EMAIL SCAMS GOT SMART

One Phish, Two Phish, Spy Phish, AI Phish: How Email ...
Harmony Email May 15, 2024


PDF-BASED EMAIL THREATS ON THE RISE: FIGHT BACK WITH AI-POWERED PREVENTION

Executive Summary: PDFs have become the dominant vector for malicious ...

 * COMPANY
   * About Us
   * Careers
   * Leadership
   * Newsroom
   * Trust Center
   * Investor Relations
   * Merchandise Store
   * Contact Us
 * TECHNICAL RESOURCES
   * User Center Sign In
   * Advisories
   * Threat Map
   * Threat Wiki
   * URL Categorization
   * App Wiki
 * EXPAND & LEARN
   * Resource Center
   * Cyber Hub
   * Check Point Research
   * Check Point Blog
   * Customer Stories
   * Product Knowledge Center
 * SUPPORT & SERVICES
   * Support Center
   * Infinity Global Service
   * IGS Portal
 * * Contact Sales
     * North America:
     * +1-866-488-6691
     * International:
     * +44-125-333-5558
   * Contact Support
     * North America:
     * +1-888-361-5030
     * International:
     * +44-114-478-2845

--------------------------------------------------------------------------------

Follow Us
YOU DESERVE THE BEST SECURITY™ ©1994- 2024 Check Point Software Technologies
Ltd. All rights reserved.
Copyright | Privacy Policy | Cookie Settings | Get the Latest News



This website uses cookies in order to optimize your user experience as well as
for advertising and analytics.  For further information, please read our Privacy
Policy and ourCookie Notice.

Cookies Settings Reject All Accept


When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices