What you need to know
- Microsoft is combatting phishing attacks by seizing control of domains.
- The newest phishing attacks try to trick people with fake coronavirus-related emails.
- A recent court ruling allowed Microsoft to seize the domains utilized in the attacks.
Microsoft is combatting coronavirus-themed cybercrime by seizing control of domains used as part of the infrastructure of criminal attacks. During the coronavirus (COVID-19) pandemic, attackers have tried to take advantage of people by sending emails claiming to provide help or information related to coronavirus. Microsoft outlines its efforts in a recent blog post (opens in new tab).
In addition to several defensive actions that Microsoft takes against these kinds of attacks, Microsoft also takes legal action when necessary. Microsoft recently filed a civil case, which resulted in a court order allowing Microsoft to seize control of key domains. By seizing these domains, Microsoft can make it more difficult for phishing emails to appear authentic.
In December 2019, Microsoft's Digital Crimes Unit (DCU) observed a new phishing scheme aimed at compromising people's Microsoft accounts. These attacks would send emails that appeared to be from Microsoft but were actually attackers maliciously using Microsoft branding and URLs that appear similar to Microsoft's official channels. According to Microsoft, the same criminals behind those attacks began a similar set of attacks that instead phished people with coronavirus-related emails.
For example, malicious emails were sent out with what appears to be an Excel spreadsheet titled "COVID-19 Bonus." The example (shown above) shared by Microsoft appears authentic, as it has the URL "@sharepointonline.com" for the sender and features copied Microsoft OneDrive branding.
If a person clicks on the deceptive links within the phishing email, they're prompted to grant access to a malicious web application. Microsoft emphasizes that web apps are used frequently by organizations, which means that people could be used to granting them permissions. The malicious web apps would then be able to access people's Microsoft Office 365 account. The prompt (shown below) asks people to grant access to several sensitive pieces of data. The prompt has a copied Microsoft logo and an icon labelled "0365" that appears similar to Microsoft's Office icon.
Microsoft lays out some steps that people and businesses can take to further protect themselves from attacks. The company recommends two-factor authentication, learning how to spot phishing schemes (opens in new tab), and enabling security alerts for links and files from suspicious websites. Microsoft also recommends checking email forwarding rules for suspicious activity.
Sean Endicott brings nearly a decade of experience covering Microsoft and Windows news to Windows Central. He joined our team in 2017 as an app reviewer and now heads up our day-to-day news coverage. If you have a news tip or an app to review, hit him up at firstname.lastname@example.org (opens in new tab).
So why now and not in all previous years we've been inundated with attacks based on various other 'areas of personal weakness'?
Microsoft has had many successful takedowns of similar operations for more than a decade now
I've been getting hammered by the same subjective probes for years. Let's see if the virus boogie men disappear all of a sudden
Yeah, cuz that's what we should expect: MS will single handedly stop all phishing. Thanks for helping me recalibrate my expectations. They unreasonably low. You were trying to make a point, right?
Thank you for signing up to Windows Central. You will receive a verification email shortly.
There was a problem. Please refresh the page and try again.