Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Scam of the Week – Microsoft Office 365 Admins Targeted in Phishing Attack

Office 365 scam

Microsoft Office 365 users have been the target of a sophisticated phishing scam which sends fake alerts to domain administrators, in a bid to compromise their accounts.

The emails, which address time-sensitive issues such as expired licenses and unauthorised access alerts, aim to create a sense of urgency and immediate action to prompt the administrator to enter their Microsoft login credentials into a phishing landing page

To add authenticity, the cybercriminals use a domain and a valid Microsoft SSL certificate. However, the hyperlinked text within the email contains a malicious URL address.

The credentials entered into the imitated login page are then checked in real-time and, if they are valid, hackers can immediately sync the user’s emails to a remote client. Unknowingly, the victims are redirected to their own Office 365 inbox so that they remain unaware that the account has been accessed.

As the user will not realise their account has been compromised, this allows the cyber criminals further time to make changes to the account which may be of benefit them such as password changes and in depth searches of their inbox.

How To Spot A Phish

Scam of the Week - Microsoft Office 365 Admins Targeted in Phishing Attack

Phishing continues to prove one of the most successful and effective ways for cyber criminals to defraud us and steal our personal and financial information. In fact, research has found that 91% of all cyber-attacks start with a phishing email.

Phishing attacks are becoming increasingly sophisticated, targeted and difficult to spot. So how do you spot the difference between a phishing email and a legitimate message? 

  • Check before you click
    Does the URL match the address displayed? If not, it is an indication that the message is fraudulent and likely to be a phishing email.
  • Requests personal information
    If the email asks for personal information such as an account number, password, pin or security questions then approach with caution. A reputable company will never request these personal details in an email.
  • Poor spelling and grammar
    If you spot any spelling mistakes or poor grammar within an email, it is unlikely to have come from an official organisation and could indicate the presence of a phishing email.
  • Sense of urgency 
    If the email creates a sense of urgency and encourages you to act immediately, this may be a sign of a phishing scam.  If you are unsure if the request is legitimate, contact the company directly via their official website or telephone number.
  • Unexpected correspondence
    If an offer seems too good to be true, then it usually is! Be wary of emails that inform you that you have won a competition that you did not enter or requests you to click on a link to claim a prize.

Protect Your Staff Against Phishing

Scam of the Week - Microsoft Office 365 Admins Targeted in Phishing Attack

Protect Your Staff Against Phishing

Our MetaPhish platform has been specifically designed to protect businesses like yours from phishing and ransomware attacks, providing the first line of defence in combating cyber-crime. Using an extensive range of templates, you can keep your staff safe from phishing scams through automated training that engages, educates and informs staff of phishing threats.

Learn More

If you would like to learn more, download our Ultimate Guide to Phishing or get in touch with our award winning team to hear how we can help to protect your staff against phishing. 

about the author

sharing is caring

Share on linkedin
Share on twitter
Share on facebook

you might enjoy reading these

UK GDPR Series Available Now

Privacy is an ongoing concern for every organisation, however, the notion of consent isn’t without its complications. To help organisations navigate data protection protocols, we
Read More »

Seasonal Phishing Templates

Phishing is a year-round activity for cybercriminals, and just like retailers, they use seasonal events as an opportunity to cash in. Seasonal occasions, including St
Read More »

Request Demo

The personal information that you provide to us in this form will only ever be used by MetaCompliance (as the Data Controller) for the following specifically defined purposes:

  • email you content that you have requested from us
  • with your consent, occasionally email you with targeted information regarding our service offerings
  • continually honour any opt-out request you submit in the future
  • comply with any of our legal and/or regulatory obligations