![]() ![]() “With the growth in Office 365 for corporate email, hackers are shifting their focus. Almost all instances of this email materialized within corporations that use Office 365 for their corporate email and, the landing page for each of the malicious URLs is a fake Microsoft login which, specifically asks for a business email account. When users clicked on the link, however, their desktop browser interpreted the link as its Punycode equivalent, sicherheit- schlü, which led to a malicious server in Belfast, Ireland.Īvanan’s analysis of the attack seems to indicate that the hackers are particularly interested in Office 365 credentials. Hackers have identified a gap in the Office 365 phishing filters and are starting to leverage it in order to compromise accounts,” according to an Avanan blog.Ī recent example captured by Avanan in Germany: a company's users received an email, pretending to be a tracking update from FedEx, with a link to . Office 365 anti-phishing tools interpreted the ASCII version as a link that took them to a benign web server in Berlin. “What makes this attack different is that instead of fooling the user, it was designed to fool the anti-phishing filters found in Office 365 and other email phishing protection systems. Research shows that with the adoption of Microsoft Office 365 in business, a significant amount of sensitive information is now, maybe unintentionally, stored in the cloud. The latest threat underscores the security risks associated with the accelerated adoption of cloud end user computing applications used by organizations and businesses including by credit unions and their members. The attack includes a phishing scheme to steal Office 365 credentials, and leverages what appears to be a vulnerability in how Office 365’s anti-phishing and URL-reputation security layers translate Punycode, a method for encoding domain names with Unicode characters. ![]() New York City-based Avanan’s cloud security researchers uncovered a new attack method, Punycode, against Microsoft’s Office 365 business email that goes undetected by default security and bypasses desktop email filters. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |