Phishing has evolved: Microsoft exposes a new campaign’s malicious trickery


    Everytime security teams and the general public get wise to a phishing scheme’s tricks and traps, it falls on the schemers to cook up a more elaborate twist on the formula to keep the swindle going. Enter: The latest evolution of phishing, as reported by Microsoft.

    The Microsoft 365 Defender Threat Intelligence Team has a hefty security blog post analyzing a multi-phase phishing campaign that packs a fresh danger in the form of binding an attacker-operated gadget to the network of an organization it wants to get inside, thereby enabling speedy lateral expansion of the campaign’s target pool.

    “The first campaign phase involved stealing credentials in target organizations located predominantly in Australia, Singapore, Indonesia, and Thailand,” Microsoft’s report says. “Stolen credentials were then leveraged in the second phase, in which attackers used compromised accounts to expand their foothold within the organization via lateral phishing as well as beyond the network via outbound spam.”

    Phase two of the aforementioned campaign can be combated with multifactor authentication (MFA). Organizations without MFA enabled, however, were susceptible to the lateral spread of credential theft and criminal maleficence. And don’t assume all organizations have MFA enabled, because that’d be far from accurate. For example, plenty of organizations with Microsoft 365 fail to use its security tools, even though they’re actively paying for them.

    In its technical breakdown of how the phishing campaign phases are carried out, Microsoft examines a situation wherein Outlook is used to facilitate the spread. Once an attacker gets into a user’s account, the mailbox gets abused, and it’s all downhill from there. It’s worth reading Microsoft’s post if you want all the technical details behind what the attackers are up to.

    We may earn a commission for purchases using our links. Learn more.





    Source link

    Previous articleMicrosoft warns of phishing campaign targeting OAuth tokens
    Next articleValveā€™s Steam Deck Finally Has an Official Release Date