Cybercriminals Going After Office 365 Administrators, Using Hijacked Accounts to Perform Phishing Attacks unicc-shopvip, uniccshopcx

Although phishing is a relatively simple social engineering scam, that doesn’t prevent cybercriminals from continuously refining old techniques and experimenting with new ones. Two phishing trends have recently been gaining traction: going after Microsoft Office 365 administrators and using compromised legitimate accounts for phishing. These techniques make phishing attempts convincing enough that individual users will have a difficult time identifying them without a comprehensive machine learning-powered security solution .
[READ: Cybercriminals are making use of HTTPS for phishing attacks ]
Phishing attacks have traditionally been crafted to trick end users. However, this meant that the attacker had access only to the victim’s files and to the areas where they had permissions. Bleeping Computer noted that instead of going for individual employees, cybercriminals have been sending phishing emails specifically targeting Microsoft Office 365 administrators — a move that, if successful, would allow them to gain administrative control over an organization’s Office 365 domain and accounts.
The phishing campaigns involve fake Office 365 alerts. These fake alerts, which are well-crafted and include the actual Office 365 logo, are meant to portray urgency by making it appear that the administrator needs to deal with time-sensitive concerns — for example, a notification that the company’s licenses have expired. The fake email typically includes links that prompt the administrator to login and fix whatever issue is being brought up. As expected, the links lead to a phishing website that asks the user to enter their Microsoft credentials.
A threat actor obtaining Office 365 administrator privileges can have dire consequences for an organization, the most obvious being unauthorized access to user emails. Another possible scenario is that cybercriminals can create user accounts under the company’s domain and then use those accounts to send additional phishing emails. Once the cybercriminal uses the legitimate domain, it becomes difficult for users to discern a legitimate message from a malicious one.
In addition to going after admin accounts, cybercriminals are also turning to hijacked accounts to perform phishing attacks — a technique called lateral phishing. A report released by Barracuda Networks points out that one in seven organizations — totaling over 100,000 recipients — had been victims to this form of phishing attack. Approximately 40% of the recipients were coworkers, while the rest formed a variety of targets, from partner companies to people in the contact list of the hijacked account.
Lateral phishing makes for an ideal social engineering technique since the use of hijacked legitimate accounts makes it tricky even for the most cautious users to realize that they’re the recipient of a malicious email.
As phishing attacks become increasingly complex, the need to properly secure enterprise systems and endpoints becomes even more important. While there is no silver bullet for weeding out all possible permutations of phishing attacks, a combination of the following best practices has been proven to yield good results.
Trend Micro solutions powered by machine learning
The sheer number of emails a person has to check in a day makes checking and filtering each individual email an unwanted but necessary chore. Fortunately, today’s modern security technology, such as the Trend Micro™ Cloud App Security™  solution, can help detect even the most convincing phishing attempts without requiring the user to spend too much time confirming the legitimacy of received emails. It employs  machine learning (ML)  to perform sender, content, and URL reputation analysis followed by an inspection of the remaining URLs using computer vision and AI to check if website components are being spoofed. In addition, it can also detect suspicious content in the message body and attachments as well as provide sandbox malware analysis and document exploit detection.
Like it? Add this infographic to your site:1. Click on the box below.   2. Press Ctrl+A to select all.   3. Press Ctrl+C to copy.   4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
In the first half of this year, cybersecurity strongholds were surrounded by cybercriminals waiting to pounce at the sight of even the slightest crack in defenses to ravage valuable assets. View the report
The upheavals of 2020 challenged the limits of organizations and users, and provided openings for malicious actors. A robust cybersecurity posture can help equip enterprises and individuals amid a continuously changing threat landscape. View the 2020 Annual Cybersecurity Report
unicc-shopvip uniccshopcx

Author: wpadmin