Press ReleaseCyber Crime & ForensicIdentity & AccessThreat Detection & Defense

Check Point Software: 5,000 Fake Microsoft Emails That Your Employees Could Fall For

In the technology sector, Microsoft stands out as one of the most frequently impersonated brands. Scammers commonly pose as Microsoft employees or affiliated vendors, deceiving emails recipients. According to the latest research findings from Harmony Email & Collaboration, this trend is accelerating.

Across the past month, Harmony Email & Collaboration’s cyber security researchers have caught over 5,000 emails masquerading as Microsoft notifications. The emails utilise exceptionally sophisticated obfuscation techniques, rendering it nearly impossible for users to distinguish them from legitimate communications.

The business implications are significant, as email compromise could lead to email account takeover, ransomware, information theft or other negative outcomes.

What’s Happening?

The fake Microsoft emails don’t originate from private or unknown domains — a clue that the emails are potential threats. Rather, the emails appear to come from organisational domains impersonating legitimate administrators.

The main portion of a given email will typically include a fake login page or portal, where malicious content may be hidden. An unsuspecting user can easily click on this and input sensitive information or download a threat.

To hide the malicious intent of these emails, cybercriminals are deploying sophisticated obfuscation techniques. Some emails include copied-and-pasted Microsoft privacy policy statements, contributing to an authentic ‘look and feel’.

Other emails have links to Microsoft or Bing pages, making it even more challenging for traditional security systems to recognise and mitigate these threats effectively.

Example of the Fake Emails

In the email shown, a cybercriminal spoofed a Microsoft email and also impersonated an organisation’s business administrator, sending a (fake) email on the administrator’s behalf. The email looks believable. In particular, the style of the email is so duplicative of what users generally receive that a given user would have no reason to flag it. The language is perfect. The style is familiar. The graphics look impeccable. So, what should organisations do?

Emails

Mitigations

There are measures that organisations can take to sidestep these email-based threats. They include:

  1. User awareness training. This requires a mention, although generative AI-based text means that users can no longer rely on grammatical errors and stylistic inconsistencies as primary indicators of social engineering.
  2. AI-powered email security. This stops the full spectrum of inbox incursions. AI-powered email security tools leverage behavioural analysis and machine learning in order to prevent email spoofing, phishing, BEC threats and more.
  3. Software patching. Organisations should keep all software up-to-date, to prevent cyber criminals from exploiting any bugs that could allow for easy email spoofing or disruption.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *