Microsoft Confirms Takedown of Phishing Domains

Microsoft Confirms Takedown of Phishing Domains

Microsoft has been approved to take control of malicious web domains which were used to send phishing messages regarding COVID-19.



According to a blog by Tom Burt, corporate vice-president of customer security and trust at Microsoft, said this was part of disrupting operations which were taking advantage of the global pandemic in an attempt to defraud customers in 62 countries around the world. 



Burt claimed Microsoft’s Digital Crimes Unit (DCU) first observed these criminals in December 2019, when they deployed a sophisticated, new phishing scheme designed to compromise Microsoft customer accounts. 



The attackers attempted to gain access to customer emails, contact lists, sensitive documents and other valuable information. The phishing emails were designed to look like they originated from an employer or other trusted source, and frequently targeted business leaders across a variety of industries, attempting to compromise accounts, steal information and redirect wire transfers. 



In recent months, the phishing emails contained messages regarding COVID-19 as a means to exploit pandemic-related financial concerns, using terms such as “COVID-19 Bonus,” and encouraging victims to click on malicious links. Once these links were clicked on, the user was prompted to grant access permissions to a malicious web application controlled by the criminals and access the victim’s Microsoft Office 365 account.



“This scheme enabled unauthorized access without explicitly requiring the victims to directly give up their login credentials at a fake website or similar interface, as they would in a more traditional phishing campaign,” Burt explained.



“As we’ve observed, cyber-criminals have been adapting their lures to take advantage of current events, using COVID-19-related themes to deceive victims. While the lures may have chan ..

Support the originator by clicking the read the rest link below.