Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A spear phishing campaign is observed targeting victims for harvesting credentials, using domain spoofing. The campaign is spoofing the official Microsoft.com domain name and targeting users of the company’s Office 365 suite. So far, the phishing email has been traced in few thousand mailboxes, while putting nearly 200 million users of Office 365 at risk. The messages originate with a spoofed domain that is an exact replica of the Microsoft.com domain, a technique called exact domain spoofing. The spear-phishing emails, so far, have targeted Office 365 users in the financial services, healthcare, insurance, manufacturing, utilities and telecom industries. In this campaign, the fraudsters are likely attempting to harvest users’ credentials.
The link will redirect users to a security portal in which they can review and take action on ‘quarantined messages’ captured by the Exchange Online Protection (EOP) filtering stack. If a user clicks the link, they are directed to input their legitimate Office 365 login credentials on a fake login page. It is important to note that these phishing emails are bypassing secure email gateways installed by the targeted companies.