Highly deceptive attack that exploits inherent trust in Microsoft’s cloud services.
Microsoft 365 infrastructure has been leveraged in new business email compromise campaigns seeking to enable credentials compromise and account takeover intrusions.
According to a report by Guardz, threat actors have been using legitimate Microsoft domains to deliver malicious emails that integrate Microsoft's logos, display name fields, and organisational metadata to spread malware.
“The result is a highly deceptive attack that exploits inherent trust in Microsoft’s cloud services, making it significantly more challenging for security teams to detect and mitigate," said Guardz researchers.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.