Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Scammers Use a Mix of Stolen Credentials, Inbox Rules, and a Rogue Outlook Client Install to Phish Internal and External Victims

    Scammers Use Mix to Phish Email

    Organizations that are not using Microsoft’s multi-factor authentication are finding themselves victims of credential attacks that involve threat actors installing Outlook on a controlled device.

    It’s pretty simple: if you don’t have MFA enabled (whether in the context of Microsoft 365 or in general), threat actors only need a username/password combination to gain access to your environment and its’ resources. And this is the lynch pin of a recent string of attacks, according to Microsoft, where the following transpires:

    • A set of Microsoft 365 credentials are obtained via a phishing campaign in the first phase of the attack
    • The credentials are used to associate an attacker-controlled endpoint with the victim’s Azure AD instance
    • Outlook is installed and the credentials are used to allow it to access the victim’s mailbox
    • Inbox rules are setup to delete any messages that include the keywords “junk;spam;phishing;hacked;password” that may warn the compromised user of a problem

    The controlled Outlook client is then used for a second attack phase where thousands of phishing emails are sent from the real mailbox, using a malicious document stored in the user’s SharePoint site as the dropper.

    In some ways this attack is a bit brazen, as we’re now seeing hackers engaging on a specific client (that can be tracked via IP and MAC address, although I’d suspect a virtual machine on compromised infrastructure is likely used).

    There are two lessons to be learned from this. First, if you don’t want to be a victim of the first phase, enable MFA and have users enrolled in Security Awareness Training to keep from having credentials compromised. And second, if you don’t want to be a victim of the second phase, Security Awareness Training, again, is the answer.

    Request A Demo: Security Awareness Training

    products-KB4SAT6-2-1

    New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn’t a one and done deal, continuous training and simulated phishing are both needed to mobilize users as your last line of defense. Request your one-on-one demo of KnowBe4’s security awareness training and simulated phishing platform and see how easy it can be!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/one-on-one-demo-partners?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top