Office 365 users targeted in SurveyMonkey phishing attack

Don Sharpe
by Don Sharpe
Author
Don has been writing professionally for over 10 years now, but his passion for the written word started back in his elementary school days. His work has been published on Livebitcoinnews.com, Learnbonds.com, eHow, AskMen.com,... Read more
Affiliate Disclosure
  • Phishing attacks are on the rise, with Office 365 users being targeted multiple times.
  • Recently, Abnormal Security uncovered a phishing campaign disguised as a MonkeySurvey.com survey and aimed at stealing Office 365 user passwords and usernames.
  • Head on over to the Anti-phishing Software section to stay up-to-date on emerging threats and their practical solutions. 
  • For more cybersecurity news and tips, check out the Security & Privacy.
SurveyMonkey email phishing
To fix various PC problems, we recommend DriverFix:
This software will keep your drivers up and running, thus keeping you safe from common computer errors and hardware failure. Check all your drivers now in 3 easy steps:

  1. Download DriverFix (verified download file).
  2. Click Start Scan to find all problematic drivers.
  3. Click Update Drivers to get new versions and avoid system malfunctionings.
  • DriverFix has been downloaded by 0 readers this month.

As phishing attacks continue to increase, it’s such a bad time for a Windows 10 user not to have an effective antimalware solution installed on their PC.

Worse still, spear phishing is the name of the game these days, in which case, the recipient of the malicious email or link is always a well-researched individual. It’s partly why such attacks are very difficult to stop.

Threat actors have targeted Office 365 users in these types of cybercrime multiple times before, and they continue to do so to date. Unsurprisingly, some of the latest victims/targets are employees participating in a fake SurveyMonkey survey.

SurveyMonkey phishing attack

The folks at Abnormal Security recently uncovered attempts to steal O365 user credentials on the pretext of conducting surveys among employees.

In the campaign, the victim receives an email from a genuine SurveyMonkey site. But the message contains a hidden link, which upon clicking, redirects the victim to a Microsoft form submission page.

The user has to submit their O365 email and password to proceed. This way, the malicious actors steal the unsuspecting user’s Microsoft account security credentials.

The email is sent from a real SurveyMonkey domain (surveymonkeyuser.com), but with a different reply-to domain. That reply-to domain was registered only 1 month ago. The email simulates an automated notification with a link to open the “survey”. This link is an actual SurveyMonkey link that redirects to the main phishing page.

It appears that these spear phishing attacks have a high probability of success due to various factors, including the use of a trusted domain. Likewise, concealing the redirect link makes it a little difficult for the target to suspect anything.

Abnormal Security points out that up to 50,000 mailboxes may have received the SurveyMonkey phishing link.

What’s your take on the state of cybersecurity against the backdrop of rising cases of Office 365-related phishing attacks? Feel free to let us know via the comments section below.


This article covers:Topics: