www.avanan.com
Open in
urlscan Pro
2606:2c40::c73c:6702
Public Scan
Submitted URL: https://www.avanan.com/e3t/Ctc/2H+113/ccGyW04/VW7lsj5z4h65W8fdj6T3htjt_W2SWDgt59Mm-xN3Bm-8K3qgyTW95jsWP6lZ3p4W6lZqfX78L...
Effective URL: https://www.avanan.com/blog/the-microsoft-reply-attack?utm_campaign=Campaign%20-%20IB-OB%20Ransomware%20North%20America...
Submission: On February 21 via manual from FR — Scanned from FR
Effective URL: https://www.avanan.com/blog/the-microsoft-reply-attack?utm_campaign=Campaign%20-%20IB-OB%20Ransomware%20North%20America...
Submission: On February 21 via manual from FR — Scanned from FR
Form analysis
1 forms found in the DOMhttps://www.avanan.com/search-results
<form id="avananSearch" class="js-focus-state input-group input-group-lg" action="https://www.avanan.com/search-results">
<input style="width: 1% !important;" type="search" name="term" autocomplete="off" class="form-control" placeholder="Search Avanan" aria-label="Search Avanan">
<div class="input-group-append">
<button type="submit" form="avananSearch" value="Submit" class="btn btn-primary" aria-label="Search">Search</button>
</div>
</form>
Text Content
× Search Quick Links Avanan Blog Attack Briefs Events Webinars Anti-Phishing Avanan vs ATP Contact Us About Us * Search * Support * Solutions Platforms * Microsoft 365 * G Suite * Slack * Teams * File Sharing * All Solutions Security * Anti-Phishing * Malware & Ransomware * Account Takeover Protection * DLP & Compliance * Archiving * Incident Response-as-a-Service Read Our Case Studies See how well we have worked for different industries Learn More * Pricing * Why Avanan Why Avanan * How it Works * About Us * True AI * Threat Calculator Compare Avanan * Compare * Avanan vs Other API Solutions * Avanan vs Secure Email Gateways See How Others Compare View Now * Partners Resellers * Become a Reseller MSP/MSSP * Become a MSP/MSSP Access Our Partner Portal Go Now * Resources Blog * Attack Briefs * All Blog Posts Events * Upcoming Webinars * Conferences * Regional Events * All Events Resources * On-Demand Webinars * White Papers & Solution Briefs * Case Studies * Avanan Comics * Videos & Presentations * Go Phish Game * All Resources Read our Attack Briefs Breaking news and exclusive details from our white-hat hackers on advanced inbox threats. Learn more * Free Trial * Get Demo AVANAN SUPPORT × DOCUMENTATION OPEN A TICKET ` 1. Blog Home 2. Attack Briefs 3. The Microsoft Reply Attack THE MICROSOFT REPLY ATTACK * Posted by Jeremy Fuchs on March 23, 2023 * * Share * One of the most spoofed brands in phishing attacks is Microsoft. Typically, you’ll see fake emails from hackers that don’t quite look like Microsoft or links to a page that looks like a Microsoft login page but is actually a way to steal credentials. Hackers do this because Microsoft is one of the most popular brands and is trusted. Users are accustomed to getting messages from the brand and logging in. In this attack brief, researchers at Avanan, a Check Point Software Company, will discuss how hackers are creating realistic messages to report unusual activity to Microsoft. Instead of sending the message to a legitimate source–aka Microsoft–, the hacker has created a “Mailtolink” that will automatically open up a new email, with the recipient being the hacker. Attack In this attack, hackers are using mail-to links to send information directly to themselves, instead of to a legitimate source. * Vector: Email * Type: Credential Harvesting * Techniques: Brand Impersonation, Mail-to Reply * Target: Any end-user * Impact: Thousands of users, across all industries and regions, have been targeted in recent weeks. Email Example #1 In this email, hackers are sending what looks like an “Unusual sign-in activity” alert. Microsoft does send these emails out when an account has an unusual sign-in. They are encouraging the end-user to “report” this activity. This, in a legitimate situation, would be the right thing to do. If there’s reason to believe that someone has access to your account, reporting that to IT is essential. Unusual logins, like one from Russia, are often a sign that the account has been compromised. Reporting it to IT allows them to investigate and take any necessary action. That’s what the hacker wants you to think will occur. It’s not what’s going to happen. Clicking on “Report the User” will open up a new email. The sender's address, subject and body will be pre-populated. It will look like this. By clicking send, the user thinks they are reporting this activity for IT to investigate. Instead, the message goes directly to the hacker. This is where social engineering starts. The hacker will reply to the message, asking the end-user for log-in information to safeguard the account. That, of course, is the opposite of what will happen. We always encourage our end-users to report any suspicious activity. If there’s a suspicious login, absolutely report it! But you still have to do your due diligence. In this case, that means looking at the links and sender address. A few things, though, are amiss. For one, the sender address. The sender address is spoofed–it’s not actually coming from Microsoft. You’ll see the Reply-To address is different. And notice the Mailto link at the bottom. It goes to a pre-filled email message that goes straight to the hacker. The hacker is hoping that the end-user will engage in a conversation, eventually giving over credentials and other personal information to block the “unusual activity”. Techniques Spoofing brands are a dime-a-dozen. What’s more challenging is engaging with something that’s not just a spoof, but appears incredibly legitimate. That’s how you get users to give over the information they don’t want to give. By making it very simple for end-users to appear they are engaging with Microsoft, the user will be more likely to give over their information. No one wants there to be someone messing with their account. Of course, the email is not going to Microsoft, but right to the hacker. The hacker will play along, before extracting enough information to actually login into their account. That makes this attack potentially challenging for users. In a hurry to ensure that no one actually compromises their account, users will try to resolve this alert quickly. That’s exactly what hackers are hoping for. Best Practices: Guidance and Recommendations To guard against these attacks, security professionals can do the following: * Always check sender address before replying to an email * If receiving emails claiming to be Unusual Logins, ask IT before engaging * Always hover over URLs to see if it’s a link or a reply-to message. * * Share * TOPICS: Blog Attack Briefs NEXT POST: AVANAN CUSTOMERS PROTECTED AGAINST NOVEL ATTACK ON MICROSOFT 365 (CVE-2023-23397) Check Point Software Technologies (Avanan) Email Security 4.7 518 Ratings Submit a review As of 21 Feb 2024 * Reviewed October 17, 2023 "In the top tier of all email security solutions..." (read more) * Reviewed October 17, 2023 "AI-Based email detection tool modernizing email security..." (read more) * Reviewed October 12, 2023 "A solution to protect email in the cloud that is easy to manage ..." (read more) * Reviewed August 14, 2023 "Best Email security ..." (read more) * Reviewed July 25, 2023 "I sleep better at night with Avanan protecting us...." (read more) * Reviewed July 13, 2023 "Great product..." (read more) * Reviewed June 23, 2023 "Avanan just works to protect your email...." (read more) * Reviewed June 12, 2023 "Avanan email security protects your email and collaboration suites using AI/ML algorithms..." (read more) * Reviewed June 9, 2023 "Ultimate cloud cover protection against cloud phishing ..." (read more) * Reviewed June 5, 2023 "User Experience..." (read more) * Reviewed May 30, 2023 "Threat detection capabilities and Prevention..." (read more) * Reviewed May 29, 2023 "Fortify your cloud collaboration and advanced threat protection with avanan ..." (read more) * Reviewed May 26, 2023 "Google Workspace security and protection aginst cyber risk..." (read more) * Reviewed May 25, 2023 "Happy Avanan customer!..." (read more) * Reviewed May 24, 2023 "Avanan is Superior..." (read more) * Reviewed May 24, 2023 "Avanan review..." (read more) * Reviewed May 24, 2023 "Best Email Security Product on the Market..." (read more) * Reviewed May 24, 2023 "Avanan will greatly reduce the amount of spam and malicious emails your org gets..." (read more) * Reviewed May 24, 2023 "Avanan a powerfull solution for the protection of Email and Collaborative Applications..." (read more) * Reviewed May 24, 2023 "Checkpoint Review..." (read more) GET A DEMO Experience the power & simplicity. Learn More * POPULAR * Safe Links | Why Is This Microsoft Office 365 Safe Link Not Safe? * HTML Attachments: The Latest Phishing Trend Targeting Office 365 * Mimecast vs. Proofpoint: Why They Can't Secure Office 365 & Gmail * Why Multi-Factor Authentication (MFA) Security Isn't Foolproof * baseStriker: Office 365 Security Fails To Secure 100 Million Email Users * Widespread in Office 365: Zero-Day Virus Email Ransomware Attack CATEGORIES * Blog (708) * Attack Briefs (289) * News (51) * Case Studies (18) * Microsoft ATP (8) 14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security. Start Free Trial ABOUT * About Us * Careers * Partners * Terms of Service * Privacy Policy EXPLORE * Platform * How it Works * View Pricing * Free Trial * Get a Demo GET IN TOUCH Contact Us +1 (855) 528-2626 info@avanan.com 259 West 30th Street New York, NY 10001 * * LATEST FROM THE AVANAN BLOG Microsoft's Clever Trick Beats Google's Guard: A Simple Guide to Cybersecurity's Latest Discovery * View All Blog Posts → © Copyright 2024 Avanan. All Rights Reserved. This website uses cookies in order to optimize your user experience as well as for advertising and analytics. For further information, please read our Privacy Policy and ourCookie Notice. Cookies Settings Reject All Accept When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices