{"id":16122,"date":"2024-10-28T09:49:05","date_gmt":"2024-10-28T13:49:05","guid":{"rendered":"https:\/\/gtm.com\/business\/?p=16122"},"modified":"2024-10-28T09:49:05","modified_gmt":"2024-10-28T13:49:05","slug":"microsoft-domains-phishing-attacks","status":"publish","type":"post","link":"https:\/\/gtm.com\/business\/microsoft-domains-phishing-attacks\/","title":{"rendered":"Beware of Microsoft Domains in Phishing Attacks"},"content":{"rendered":"<p><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16123\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/10\/pexels-shkrabaanthony-5475752.jpg\" alt=\"microsoft domains phishing attacks\" width=\"1024\" height=\"682\" srcset=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/10\/pexels-shkrabaanthony-5475752.jpg 1024w, https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/10\/pexels-shkrabaanthony-5475752-980x653.jpg 980w, https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/10\/pexels-shkrabaanthony-5475752-480x320.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/em><\/p>\n<p><em>Our HCM partner, <a href=\"https:\/\/www.isolvedhcm.com\/\" target=\"_blank\" rel=\"noopener\">isolved<\/a>, recently published a case study involving a phishing attack using Microsoft domain names. Employers and employees should be aware of using Microsoft domains in these cyber threats and follow the advice below to prevent an attack on your company&#8217;s data.<\/em><\/p>\n<p style=\"text-align: left;\" align=\"center\">This month, isolved\u2019s Cybersecurity team is highlighting the uptick in the malicious use of Microsoft domains. These phishing attacks are difficult to detect because they appear to come from Microsoft. We will discuss a real case that appeared at isolved and intelligence from our Managed Security Service Provider (MSSP) involving \u201cattacker-in-the-middle\u201d techniques to capture credentials.<\/p>\n<h2 style=\"text-align: left;\" align=\"center\">Real Case: Your Microsoft Order On\u2026<\/h2>\n<p style=\"text-align: left;\" align=\"center\">On a steamy September morning, Fred (name disguised) contacted a member of isolved\u2019s cybersecurity team to report an unusual Microsoft email. He did not order any Microsoft products and questioned receiving such a notification.<\/p>\n<p style=\"text-align: left;\" align=\"center\">The email appears to be from the legitimate microsoft.com email (microsoft-noreply@microsoft.com). This is just the displayed address or the \u201cheader\u201d address. The actual \u201cenvelope\u201d address was from vt@dur*****shop.onmicrosoft.com (disguised bad actor\u2019s address). Anyone, including hackers, can use these onmicrosoft.com emails. They often make it through email security systems because they are legitimate Microsoft email addresses.<\/p>\n<p style=\"text-align: left;\" align=\"center\">Fred also noticed a few important points in the body of the phishing email:<\/p>\n<ol style=\"text-align: left;\">\n<li>He never ordered Global Microsoft 365 Business Premium and immediately suspected the email to be fake.<\/li>\n<li>Fred\u2019s eye went to the lowercase \u201cca,\u201d he knew a true professional Microsoft email would capitalize the state abbreviation in an address.<\/li>\n<li>The address was not a physical isolved address at all.<\/li>\n<li>There was no PO #. The random string of numbers for the order ID looked bizarre.<\/li>\n<\/ol>\n<h2 style=\"text-align: left;\" align=\"center\">Microsoft PowerApps Portal Domain Used for AiTM (Attacker-in-the-Middle) Attacks<\/h2>\n<p style=\"text-align: left;\" align=\"center\">isolved\u2019s Managed Security Service Provider highlighted the use of powerappsportals[.]com in \u201cattacker-in-the-middle&#8221; attacks to deal users\u2019 MFA codes.<\/p>\n<h3 style=\"text-align: left;\" align=\"center\">How does the attacker succeed?<\/h3>\n<ol style=\"text-align: left;\">\n<li>The hacker sends the user a phishing email with an attachment.<\/li>\n<li>This attachment contains the URL (powerappsportal) that leads the victim to the fake Microsoft login.<\/li>\n<li>Certificate avoids detection because it is confirmed as legitimate.<\/li>\n<li>Victim enters username and password.<\/li>\n<li>Hacker intercepts MFA.<\/li>\n<li>The hacker now has all credentials harvested.<\/li>\n<\/ol>\n<h2 style=\"text-align: left;\" align=\"center\">Recommended Actions<\/h2>\n<ul style=\"text-align: left;\">\n<li>Never click on any links or attachments without complete verification. This means calling to verify. Do not call the number on the email; search the internet and verify actual numbers.<\/li>\n<li>Never enter a password or credit card on a page you received from a link in a message. This is most likely a phishing attempt.<\/li>\n<li>Always review the body of the email for any irregularities and grammatical errors.<\/li>\n<li>Report all suspected phishing emails by clicking the Mimecast button at the top of your Office 365 email. Toggle down to Report Phishing if you suspect a phishing email. This will help Mimecast\u2019s artificial intelligence component to become smarter.<\/li>\n<\/ul>\n<p style=\"text-align: left;\" align=\"center\">If you have any questions, please contact your company\u2019s IT department.<\/p>\n<h2 style=\"text-align: left;\" align=\"center\">Trust Your Data with GTM&#8217;s Security Measures<\/h2>\n<p>At GTM, we understand that trust is the foundation of our relationship with you. When it comes to payroll, security, and compliance, these are not just priorities but imperatives. <a href=\"https:\/\/gtm.com\/business\/why-gtm\/data-security\/\">We are dedicated to maintaining the highest levels of data security<\/a>, fraud prevention, and regulatory compliance to protect the sensitive information you entrust to us. Every GTM employee undergoes regular testing to ensure that we can identify phishing emails and other issues. In addition, GTM Payroll is compliant with the New York State Department of Financial Services cyber security regulation (23 NYCRR 500).\u00a0 We also use two-factor authentication to allow access to our systems, adding an additional layer of security to the process, making it more difficult for hackers to access a client or staff member\u2019s devices or online accounts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Employers should be aware of the use of Microsoft domains in new phishing attacks. Here&#8217;s a look at what they are and how to prevent them.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[232],"tags":[221,287,18,225],"post_folder":[],"class_list":["post-16122","post","type-post","status-publish","format-standard","hentry","category-gtm-biz-blog-isolved","tag-cyberattack","tag-cybersecurity","tag-employer-policies","tag-phishing"],"_links":{"self":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/16122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/comments?post=16122"}],"version-history":[{"count":5,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/16122\/revisions"}],"predecessor-version":[{"id":16128,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/16122\/revisions\/16128"}],"wp:attachment":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/media?parent=16122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/categories?post=16122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/tags?post=16122"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/post_folder?post=16122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}