Security News > 2021 > March > Microsoft warns of phishing attacks bypassing email gateways

An ongoing phishing operation that stole an estimated 400,000 OWA and Office 365 credentials since December has now expanded to abuse new legitimate services to bypass secure email gateways.
The attacks are part of multiple phishing campaigns collectively dubbed the "Compact" Campaign, active since early 2020 first detected by the WMC Global Threat Intelligence Team.
The threat actors also use compromised accounts for SendGrid and MailGun email delivery services, taking advantage of secure email gateways allow lists having them listed as trusted domains.
This allows the phishing messages to bypass them and land in the targets' inboxes, luring them into clicking on embedded hyperlinks that redirect them to phishing landing pages designed to impersonate Microsoft login pages.
The phishing operation continues to expand as it now also abuses Amazon Simple Email Service and the Appspot cloud computing platform-used to develop and host web apps in Google-managed data centers-to deliver phishing emails and generate multiple phishing URLs for each target.
"Because this campaign uses compromised email marketing accounts, we strongly recommend orgs to review mail flow rules for broad exceptions that may be letting phishing emails through," Microsoft advised.
News URL
Related news
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware (source)
- Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks (source)
- PoisonSeed phishing campaign behind emails with wallet seed phrases (source)
- iOS devices face twice the phishing attacks of Android (source)
- Microsoft Defender will isolate undiscovered endpoints to block attacks (source)
- Tycoon2FA phishing kit targets Microsoft 365 with new tricks (source)
- Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft (source)
- Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins (source)
- Windows NTLM hash leak flaw exploited in phishing attacks on governments (source)
- Phishing emails delivering infostealers surge 84% (source)