Office 365 accounts are among the most frequent targets for phishing scams. After recent reports revealed that the login page is the first step where such attacks occur, we now get to find out what kind of attack one can expect.
More specifically, WMC Global cites PhishFeed analysts in their attempt to deconstruct a new phishing scam targeted at Office 365 users, still at the login page.
Detecting the new phishing technique
The new strategy involves inverting the background image colors and thus making it look like the original, however containing a fake login form.
The purpose is to avoid being spotted as a malicious attempt and bypass any detection engine. Additionally, this technique supposedly doesn’t make users suspicious and avoid entering their credentials.
To make the attempt look even more legitimate, the phishing kit uses a little trick. Namely, the inverted color image is stored by the attackers, then they modify the CSS index.php code to force the color to revert to the original state.
Further on, the visitors get the fake page, while the detection engines receive the original one, and more likely wouldn’t notice the scam.
What’s more, according to the source:
[…] The inverted image was discovered within a deployed Office 365 credential phishing kit. Our team reviewed other campaigns deployed by this threat actor, discovering that the individual was using the same inversion technique on the newer Office365 background.
It’s always a good idea to stay on the watch for these scams to avoid falling into the trap.
Bitdefender Antivirus PlusLet Bitdefender keep an eye on possible phishing attempts while you enjoy safe browsing.
While it’s hard for the regular user to spot fake log-in pages, staying away from unsolicited links and forms might save you from further trouble.
Also using a powerful antivirus with a proven detection rate against phishing attacks, such as Bitdefender, will add to your safety while surfing the Internet.
We hope that you haven’t been victim to such a phishing scam; but if you have, you can share your experience with us in the comments below.