Office 365 users targeted in SurveyMonkey phishing attack

Reading time icon 2 min. read


Readers help support Windows Report. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help Windows Report sustain the editorial team. Read more

Key notes

  • Phishing attacks are on the rise, with Office 365 users being targeted multiple times.
  • Recently, Abnormal Security uncovered a phishing campaign disguised as a MonkeySurvey.com survey and aimed at stealing Office 365 user passwords and usernames.
  • Head on over to the Anti-phishing Software section to stay up-to-date on emerging threats and their practical solutions.ย 
  • For more cybersecurity news and tips, check out the Security & Privacy.
SurveyMonkey email phishing

As phishing attacks continue to increase, itโ€™s such a bad time for a Windows 10 user not to have an effective antimalware solution installed on their PC.

Worse still, spear phishing is the name of the game these days, in which case, the recipient of the malicious email or link is always a well-researched individual. Itโ€™s partly why such attacks are very difficult to stop.

Threat actors have targeted Office 365 users in these types of cybercrime multiple times before, and they continue to do so to date. Unsurprisingly, some of the latest victims/targets are employees participating in a fake SurveyMonkey survey.

SurveyMonkey phishing attack

The folks at Abnormal Security recently uncovered attempts to steal O365 user credentials on the pretext of conducting surveys among employees.

In the campaign, the victim receives an email from a genuine SurveyMonkey site. But the message contains a hidden link, which upon clicking, redirects the victim to a Microsoft form submission page.

The user has to submit their O365 email and password to proceed. This way, the malicious actors steal the unsuspecting userโ€™s Microsoft account security credentials.

The email is sent from a real SurveyMonkey domain (surveymonkeyuser.com), but with a different reply-to domain. That reply-to domain was registered only 1 month ago. The email simulates an automated notification with a link to open the โ€œsurveyโ€. This link is an actual SurveyMonkey link that redirects to the main phishing page.

It appears that these spear phishing attacks have a high probability of success due to various factors, including the use of a trusted domain. Likewise, concealing the redirect link makes it a little difficult for the target to suspect anything.

Abnormal Security points out that up to 50,000 mailboxes may have received the SurveyMonkey phishing link.

Whatโ€™s your take on the state of cybersecurity against the backdrop of rising cases of Office 365-related phishing attacks? Feel free to let us know via the comments section below.

[wl_navigator]

More about the topics: Cybersecurity

User forum

0 messages