www.avanan.com
Open in
urlscan Pro
2606:2c40::c73c:6702
Public Scan
URL:
https://www.avanan.com/blog/abusing-microsoft-customer-voice-to-send-phishing-links
Submission: On December 14 via api from US — Scanned from DE
Submission: On December 14 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMhttps://www.avanan.com/search-results
<form id="avananSearch" class="js-focus-state input-group input-group-lg" action="https://www.avanan.com/search-results">
<input style="width: 1% !important;" type="search" name="term" autocomplete="off" class="form-control" placeholder="Search Avanan" aria-label="Search Avanan">
<div class="input-group-append">
<button type="submit" form="avananSearch" value="Submit" class="btn btn-primary" aria-label="Search">Search</button>
</div>
</form>
Text Content
× Search Quick Links Avanan Blog Attack Briefs Events Webinars Anti-Phishing Avanan vs ATP Contact Us About Us * Search * Support * Solutions Platforms * Microsoft 365 * G Suite * Slack * Teams * File Sharing * All Solutions Security * Anti-Phishing * Malware & Ransomware * Account Takeover Protection * DLP & Compliance * Archiving * Incident Response-as-a-Service Read Our Case Studies See how well we have worked for different industries Learn More * Pricing * Why Avanan Why Avanan * How it Works * About Us * True AI * Threat Calculator Compare Avanan * Compare * Avanan vs Other API Solutions * Avanan vs Secure Email Gateways See How Others Compare View Now * Partners Resellers * Become a Reseller MSP/MSSP * Become a MSP/MSSP Access Our Partner Portal Go Now * Resources Blog * Attack Briefs * All Blog Posts Events * Upcoming Webinars * Conferences * Regional Events * All Events Resources * On-Demand Webinars * White Papers & Solution Briefs * Case Studies * Avanan Comics * Videos & Presentations * Go Phish Game * All Resources Read our Attack Briefs Breaking news and exclusive details from our white-hat hackers on advanced inbox threats. Learn more * Free Trial * Get Demo AVANAN SUPPORT × DOCUMENTATION OPEN A TICKET ` 1. Blog Home 2. Attack Briefs 3. Abusing Microsoft Customer Voice to Send Phishing Links ABUSING MICROSOFT CUSTOMER VOICE TO SEND PHISHING LINKS * Posted by Jeremy Fuchs on November 3, 2022 * * Share * Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers. It can be used for customer satisfaction surveys, to track customer feedback and to aggregate data into actionable insights. It can also be used to interact with customers via phone, with the data being collected for more customer input. It is here where hackers have taken notice. Instead of using this for customer feedback, hackers are trying to steal customer information. In this attack brief, researchers at Avanan, a Check Point Software Company, will discuss how hackers are using Microsoft’s Dynamic 365 Customer Voice to send phishing links. Attack In this attack, hackers are leveraging legitimate links from Microsoft notifications to send credential harvesting pages. Avanan has seen hundreds of these attacks in the last few weeks. * Vector: Email * Type: Credential Harvesting * Techniques: Social Engineering, Impersonation * Target: Any end-user Email Example #1 This email comes from the survey feature in Dynamics 365. Interestingly, you’ll notice the sending address has “Forms Pro” in it, which is the old name of the survey feature. The email shows that a new voicemail has been received. To the end user, this looks like a voicemail from a customer, which would be important to listen to. Clicking on it is the natural step. Email Example #2 This is a legitimate Customer Voice link from Microsoft. Because the link is legit, scanners will think that this email is legitimate. However, when clicking upon the “Play Voicemail” button, hackers have more tricks up their sleeves. The intent of the email is not in the voicemail itself; rather, it is to click on the “Play Voicemail” button, which redirects to a phishing link. Email Example #3 Once you click on the voicemail link, you are redirected to a look-alike Microsoft login page. This is where the threat actors steal your username and password. Notice the URL is different from a typical Microsoft landing page. Techniques Hackers continually use what we call The Static Expressway to reach end-users. In short, it’s a technique that leverages legitimate sites to get past security scanners. The logic is this: Security services can’t outright block Microsoft–it would be impossible to get any work done. Instead, these links from trusted sources tend to be automatically trusted. That has created an avenue for hackers to insert themselves. We’ve seen this a lot recently, whether it’s Facebook, PayPal, QuickBooks or more. It is incredibly difficult for security services to suss out what is real and what is nested behind the legitimate link. Plus, many services see a known good link and, by default, don’t scan it. Why scan something good? That’s what hackers are hoping for. This is a particularly tricky attack because the phishing link doesn’t appear until the final step. Users are first directed to a legitimate page–so hovering over the URL in the email body won’t provide protection. In this case, it would be important to remind users to look at all URLs, even when they are not in an email body. These attacks are incredibly difficult to stop for scanners and even harder for users to identify. Best Practices: Guidance and Recommendations To guard against these attacks, security professionals can do the following: * Always hover all URLs, even those not in the email body * When receiving an email with a voicemail, ensure this is a typical type of email received before thinking of engaging * If ever unsure about an email, ask the original sender * * Share * TOPICS: Blog Attack Briefs NEXT POST: WHAT IS A VISHING ATTACK? Check Point Software Technologies (Avanan) Email Security 4.7 520 Ratings Submit a review As of 14 Dec 2023 * Reviewed October 17, 2023 "In the top tier of all email security solutions..." (read more) * Reviewed October 17, 2023 "AI-Based email detection tool modernizing email security..." (read more) * Reviewed October 12, 2023 "A solution to protect email in the cloud that is easy to manage ..." (read more) * Reviewed August 14, 2023 "Best Email security ..." (read more) * Reviewed July 25, 2023 "I sleep better at night with Avanan protecting us...." (read more) * Reviewed July 13, 2023 "Great product..." (read more) * Reviewed June 23, 2023 "Avanan just works to protect your email...." (read more) * Reviewed June 12, 2023 "Avanan email security protects your email and collaboration suites using AI/ML algorithms..." (read more) * Reviewed June 11, 2023 "Very nice, fantastic and pocket friendly cloud email security application. ..." (read more) * Reviewed June 9, 2023 "Ultimate cloud cover protection against cloud phishing ..." (read more) * Reviewed June 5, 2023 "User Experience..." (read more) * Reviewed May 30, 2023 "Threat detection capabilities and Prevention..." (read more) * Reviewed May 29, 2023 "Fortify your cloud collaboration and advanced threat protection with avanan ..." (read more) * Reviewed May 26, 2023 "Google Workspace security and protection aginst cyber risk..." (read more) * Reviewed May 25, 2023 "Happy Avanan customer!..." (read more) * Reviewed May 24, 2023 "Avanan is Superior..." (read more) * Reviewed May 24, 2023 "Avanan review..." (read more) * Reviewed May 24, 2023 "Best Email Security Product on the Market..." (read more) * Reviewed May 24, 2023 "Avanan will greatly reduce the amount of spam and malicious emails your org gets..." (read more) * Reviewed May 24, 2023 "Avanan a powerfull solution for the protection of Email and Collaborative Applications..." (read more) GET A DEMO Experience the power & simplicity. Learn More * POPULAR * Safe Links | Why Is This Microsoft Office 365 Safe Link Not Safe? * HTML Attachments: The Latest Phishing Trend Targeting Office 365 * Mimecast vs. Proofpoint: Why They Can't Secure Office 365 & Gmail * Why Multi-Factor Authentication (MFA) Security Isn't Foolproof * baseStriker: Office 365 Security Fails To Secure 100 Million Email Users * Widespread in Office 365: Zero-Day Virus Email Ransomware Attack CATEGORIES * Blog (690) * Attack Briefs (283) * News (51) * Case Studies (18) * Microsoft ATP (8) 14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security. Start Free Trial ABOUT * About Us * Careers * Partners * Terms of Service * Privacy Policy EXPLORE * Platform * How it Works * View Pricing * Free Trial * Get a Demo GET IN TOUCH Contact Us +1 (855) 528-2626 info@avanan.com 259 West 30th Street New York, NY 10001 * * LATEST FROM THE AVANAN BLOG Phishing via Genial.ly * View All Blog Posts → © Copyright 2023 Avanan. All Rights Reserved. This website uses cookies in order to optimize your user experience as well as for advertising and analytics. For further information, please read our Privacy Policy and ourCookie Notice. Cookies Settings Reject All Accept When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices