Hackers launched a phishing campaign to collect corporate data in Microsoft Office 365 accounts; to circumvent security systems, they used the names of well-known organizations – Oxford University, Adobe and Samsung.
This is stated in a statement by Check Point, an IT security company.
According to experts, in one of the phishing campaigns, the attackers sent letters to their victims, which contained links to the Adobe server.
“Previously, it (server – ed.) Was used by Samsung. This allowed hackers to create the appearance of a legitimate Samsung domain – this increased the trust of the victims. Thus, the victims were redirected to the login credentials page for logging in to Office 365, ”the message says.
At the beginning of April 2020, another phishing campaign was recorded, the subject line of the letter indicated “Office 365 voicemail”. The letter said that to listen to the message, you need to follow the link, but if the victim clicked on the link, she was redirected to a phishing page disguised as an Office 365 login page. The letters also came from several generated addresses that belonged to real subdomains of different departments of Oxford University .
Check Point informed Oxford University, Adobe, and Samsung about their findings.
Experts advise Office 365 users to use different passwords for the cloud application, this can protect your accounts if one of them is hacked. In addition, it is recommended to use security solutions for mail and for clouds and not enter your credentials when clicking on suspicious links.