Guardz Uncovers Details of an Active Phishing Campaign Targeting Microsoft 365 Infrastructure

Cybersecurity Company Discovers and Disrupts Advanced Phishing Campaign Targeting Microsoft 365 Users

Recently, cybersecurity firm Guardz reported a sophisticated phishing operation exploiting Microsoft 365’s infrastructure. This alarming campaign, aimed at small and medium-sized businesses (SMBs), manipulates victims into unwittingly contacting a malicious call center, thereby facilitating credential harvesting and potential account takeover (ATO).

Guardz’s research team uncovered the phishing scheme while monitoring threats against their clients. The attackers used Microsoft’s trusted services to obscure their malicious intent, creating challenges for both sophisticated security systems and unsuspecting users. With the use of established email protocols, the phishing emails appeared legitimate, enabling them to navigate traditional defenses undetected.

In a detailed analysis of the attack methods, Guardz revealed how adversaries gain access to Microsoft 365 tenants by either registering new accounts or compromising existing ones. This manipulation allows the threat actors to navigate trust frameworks and utilize Microsoft’s infrastructure for their gains, including the integration of phishing content within seemingly legitimate emails. By leveraging organizational profile spoofing, attackers can seamlessly manipulate Microsoft 365 properties, making it increasingly difficult for users to identify red flags.

Key tactics employed in this campaign involve various phases. The initial step involves the acquisition of infrastructure. Control over multiple Microsoft 365 organization tenants is established, which significantly enhances the attackers’ ability to operate under the radar. Once access is gained, the attackers set up administrative accounts, employing evasive strategies to bypass detection protocols.

The next phase involves preparation for deception. The attackers configure the second tenant to display a misleading organizational name that mimics genuine Microsoft notifications. This tactic plays on the email display features of Microsoft 365, effectively embedding phishing lures within authentic-looking communications. Subsequently, attackers initiate legitimate actions, such as trial subscriptions, that generate real Microsoft billing emails, thus ensuring the phishing content appears credible and trusted.

The attackers’ strategic use of Microsoft’s email infrastructure allows their phishing emails to transit through Microsoft’s servers without triggering security alerts. As a result, these messages are more likely to end up in a victim’s inbox, significantly increasing the chances of engagement.

The final aspect of this campaign centers on victim interaction. Phishing emails often include fabricated support contact details, urging users to interact directly with the attackers. This tactic enhances the campaign’s success rate beyond traditional email-based phishing efforts, enabling cybercriminals to manipulate victims more effectively.

The findings by Guardz are a stark reminder of the continuous evolution of cyber threats, particularly against the backdrop of enhanced email security measures like secure email gateways (SEGs) and advanced threat protection technologies. This persistence highlights the necessity for businesses to adopt a comprehensive approach toward cybersecurity, one that anticipates sophisticated methods of manipulation and exploitation.

In light of Guardz’s findings, the company emphasizes the importance of enhanced detection and response tools for businesses. This includes advanced email analysis, user awareness training, and stringent validation processes for any external communication, especially those appearing to originate from legitimate domains.

As cyber threats become increasingly sophisticated, understanding potential tactics outlined in the MITRE ATT&CK framework can help businesses remain vigilant. By identifying adversary tactics such as initial access and deception, companies can better fortify their defenses against emerging phishing schemes and other cyber risks.

For further information on this phishing campaign and the proactive measures available to counteract such threats, businesses can read the full report on Guardz’s website.

Source