Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A new phishing campaign is actively targeting Microsoft Office 365 administrators with the end goal of compromising their entire domain and using newly created accounts on the domain to deliver future phishing emails. The attackers use phishing emails designed to look like they are coming from Microsoft, with the Office 365 logo shown at the top, and delivered using “validated domains” “from a legitimate organization’s Office 365 infrastructure”.
The phishing emails ask the targets to sign into their account on the Office 365 Admin center to update their payment information, and it even has links to Microsoft’s privacy statement and an unsubscribe option at the bottom of the message.
Admins are also invited to choose the release track for their org and use the settings to join “First Release” if they haven’t done it already.
Once they click the sign-in link embedded in the phishing email, the targets are sent to a fake Microsoft login page that requires them to enter their email or phone to proceed.
The attackers used accounts they created on previously compromised Office 365 domains for sending the phishing messages, this strategy allowing them to both evade detection by secure email gateways (SEGs) and avoid being spotted while maintaining their presence on a legitimate org’s domain.
Using a freshly created Office 365 account, makes it possible for them to go about their business without having to worry that the other users can spot their malicious activity “either by observing outgoing mail or receiving automated responses from failed delivery attempts.”
Credential theft