Security News > 2021 > October > How a vishing attack spoofed Microsoft to try to gain remote access

A standard phishing attack typically involves sending people an email or text message spoofing a known company, brand or product in an attempt to install malware or steal sensitive information.
The emails borrowed the look and layout of actual emails from Microsoft and even included information on a subscription for Microsoft Defender Advanced Protection that supposedly was ordered by the recipient.
The emails tried to convey a sense of trust, as it appears to come from Microsoft.
The initial emails described by Armorblox snuck past the Google Workspace email security.
Inspect the sender's name, email address and the language used within the email.
Check for any inconsistencies in the message leading you to ask yourself such questions as: "Why is a Microsoft email being sent from a Gmail account?" and "Why are there no links in the email, even in the footer?".
News URL
Related news
- Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks (source)
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware (source)
- Who's calling? The threat of AI-powered vishing attacks (source)
- Microsoft Defender will isolate undiscovered endpoints to block attacks (source)