Firewall

Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Nowadays, the phishing attacks are increasing at an alarming rate, and these attacks are drastically affecting and harming the business organization. Recently, the cybersecurity researchers have detected a phishing campaign in which the attackers steal outlook passwords via overlay screens on legitimate sites of the targeted company’s homepage.

The Cofense Phishing Defense Center (PDC) had discovered that the phishing campaign started with an attack email that has misrepresented itself as a message quarantine information from all the company’s IT department that has been targeted. 

PDC is a team of experts who are trained to recognize, interpret, respond to, and remediate the phishing attacks that endanger your organization.

While if we talk about the attack, then it’s a new type of attack that has been observed by the experts. All these new techniques in an attack pointed at an unnamed company, and the messages were pretending as the professional support team of the employee’s company.

Attack vector

In this incident, the main motive of this phishing attack is to steal Outlook passwords and concluded that the phishing link was created to draw the homepage of the organization that is involved in the original recipient’s email address.

After not reacting to the emails by the organizations that have been sent by the threat actors, they started to put stress on the target. And here, the threat actor tricks them into communicating with the targeted site via messages. 

It states that two of the messages were contemplated as valid and are being held for deletion. However, to minimize the risk and impact, the Cofense Phishing Defense Center uses the social engineering technique, as it is very efficient and tries to store all the essential documents and communications.  

Most importantly, all the malicious link that has been employed in this phishing campaign have used specific parameters to circumscribe the page pull to use. And after that, they can easily overlay the fake login on top.

The organizations do all possible procedures to secure themselves from this kind of attack. As this type of phishing attacks are new to experts, and they are taking all their time to understand the importance of the attack. 

This kind of attack explains the necessity for businesses to protect themselves against phishing attacks. And therefore, the organizations can protect themselves by doing some initial steps. 

All the organizations should educate their every user regarding some standard phishing campaigns, as it will help them to defend themselves without seeking anybody’s help.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Hackers Infiltrated 9-days Within UnitedHealth Network Before Ransomware Attack

Andrew Witty, CEO of UnitedHealth Group, detailed a sophisticated ransomware attack on Change Healthcare, a…

16 hours ago

Malware Cuckoo – Previously Unknown Infosteler Spyware Steals Data From MacOS

Security researchers have uncovered a previously undetected malware threat for macOS that exhibits characteristics of…

17 hours ago

Postman API Testing Platform Flaw Exposes Sensitive Credentials

Truffle Security Co. has recently discovered a major vulnerability in Postman, the widely used API…

19 hours ago

Millions of Docker Hub Repositories Found Pushing Malware for Over 5 Years

It has been found that almost one-fifth of the repositories on Docker Hub, a popular…

20 hours ago

Investigating Two TeamCity Authentication Bypass Vulnerabilities

Vulnerability exploits are the third most common way that cybercriminals gain access to target organizations,…

1 day ago

Threat Actors Claiming of 0-Day Vulnerability in Zyxel VPN Device

Threat actors have claimed to have discovered a 0-day vulnerability in Zyxel VPN devices. This…

1 day ago