Microsoft users targeted by scammers pretending to be Zoom
Comedians have long been known for spoofing celebrities and the like, but nowadays threat actors are increasingly mimicking established brands. In this latest case uncovered by Armorblox, the conferencing app gets the cybercriminal makeover.
It claims the attack it prevented targeted around 21,000 Microsoft Exchange inboxes and would have bypassed security to slam an unnamed healthcare company with a malicious payload.
The bogus emails were tailored to individual employees by featuring their specific name in the subject field, and featured the Zoom logo at the top “to instill trust in the recipient.”
“The attacker chose to populate the victim’s name within the title of the email to bring a level of personalization to the attack,” said Armorblox. “The body of the email contained two messages that were awaiting a response [and] two bad URLs – one associated with the main call-to-action button and the other was shadowed as an unsubscribe link.”
The button was designed to take victims to a fake landing page resembling a Microsoft login portal, before prompting them to enter their password to access messages that were “awaiting a response.”
This is not an isolated occurrence. According to another cybersecurity report by Avanan, Microsoft has been increasingly targeted by social engineering campaigns – findings that appear to be borne out by the Armorblox investigation.
“We see similar styling of this fake landing page across many spoofed Microsoft login pages used within targeted attacks – with the page being dominated by the login prompt and the victim’s email address already being populated,” said Armorblox.
“This helps attackers foster that sense of trust in the victims, making them more likely to fall for these types of sophisticated email attacks.”
More from Cybernews:
Teen arrested for using Optus hack data
Water Labbu attacker robs scammers of their loot
Inflation drives crypto usage in Middle East
Hacker sentenced to 20 years over ransomware attacks
Subscribe to our newsletter
Your email address will not be published. Required fields are marked