chat
expand_more

Microsoft Teams Impersonated in Office 365 Phishing Attack

We caught a recent phishing attack through a fake Microsoft Teams email designed to steal Office 365 login credentials.
May 1, 2020

Attackers often impersonate well-known brands, and Microsoft is typically one of the most impersonated, given that access to any Microsoft account opens the possibility of accessing ongoing email threats, sensitive documents, and other Microsoft programs. In addition, Microsoft Teams has seen a massive increase in users as a result of the shift to remote work given the ongoing COVID-19 pandemic. In a recent attack, the chat platform was impersonated in a credential phishing attack, attempting to steal Office 365 login credentials.

Summary of Attack

  • Platform: Microsoft Office 365
  • Victims: Employees
  • Payload: Malicious Link
  • Technique: Impersonation Email

About the Microsoft Teams Impersonation Attack

Since the onset of the COVID-19 outbreak and the shift to remote work, there has been a remarkable increase in the usage of collaboration software. This particular attack impersonates Microsoft Teams—one of the leading collaboration software tools in widespread use.

These attackers crafted convincing emails that impersonate automated notification emails from Microsoft Teams. The landing pages that host both attacks look identical to the real web pages, and the imagery used is copied from actual notifications and emails from this provider.

Fake Microsoft Teams email phishing
Phishing attack with a fake Microsoft Teams email

Within the email, attackers utilize numerous URL redirects in order to conceal the real URL that hosts the attack. This tactic is employed in an attempt to bypass malicious link detection used by legacy email protection services. After clicking on a link, there is an image urging the recipient to log in to Microsoft Teams. Once the user clicks this image, the URL takes the recipient to a compromised page which impersonates the Microsoft Office login page.

Fake Microsoft Office login scam
The fake Microsoft Office login scam used in the phishing attack

In a separate attack impersonating Microsoft Teams, the sender email originates from a recently registered domain, “sharepointonline-irs.com”, which is not associated with either Microsoft or the IRS. The URL redirect is hosted on YouTube, then redirected twice to the final webpage, which hosts another phishing credentials site mimicking the Microsoft login page.

Should the recipient fall victim to either of these attacks, their Microsoft credentials would be compromised. Since Microsoft Teams is linked to Microsoft Office 365, the attacker may have access to other information available with the user’s Microsoft credentials via single-sign-on.

Why the Microsoft Teams Attack is Effective

The emails impersonating Microsoft Teams and the landing pages the attackers created were all extremely convincing. The webpages and the links within the email are visually identical to legitimate Microsoft Teams and Microsoft login pages, so recipients would be hard-pressed to understand that these sites were set up to misdirect and deceive them to steal their credentials

Furthermore, given the current situation, people have become accustomed to notifications and invitations from collaboration software providers. Because of this, recipients might not look further to investigate the message.

Curious how Abnormal Security stops these and other brand impersonation attacks? Request a demo to learn more.

Microsoft Teams Impersonated in Office 365 Phishing Attack

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Most Interesting Attacks Q1 2024
Take a look at five of the most unique and sophisticated email attacks recently detected and stopped by Abnormal.
Read More
B MKT499 Images for Customer Blog Series
Discover key industry trends and insights from cybersecurity leader Michael Marassa, CTO of New Trier Township High School District 203.
Read More
B Construction Professional Services QR Code Attacks
Abnormal data shows construction firms and professional service providers are up to 19.2 times and 18.5 times, respectively, more likely to receive QR code attacks than organizations in other industries.
Read More
B 1500x1500 Evolving Abnormal R2
From the beginning, we created Abnormal Security to be a generational company that protects people from cybercrime. Here’s how we’re doing it.
Read More
Blog Cover 1500x1500 Images for SOC Time Blog
Discover the critical tasks that occupy SOC analysts’ schedules beyond mere inbox management, and discover insights into optimizing efficiency in cybersecurity operations.
Read More
B 1500x1500 MKT494 Top Women in Cybersecurity
In honor of Women's History Month, we're spotlighting 10 women leaders who are making invaluable contributions to cybersecurity.
Read More