Before adding and sharing your Fraud Alert please check to see if a similar alert has already been posted, thank you:


Salted Hash Ep 10: Office 365 phishing examples, the bad and the ugly

Fraud Alert:

This week’s episode of Salted Hash is a personal one, as we’re taking a look at some Office 365 phishing emails that have targeted staffers at CSO Online and CIO.com. The attempts themselves are really low quality, but they work. We’ve covered this topic a lot this quarter and since we’ve gotten questions, it’s clear some of you want to keep abreast of the situation.

This episode was filmed in late October. Since that time, there have been additional Office 365 phishing attempts, but they have started to slow down. This is a good thing, but it doesn’t mean the problem is going away. Instead, it’s more likely the unresponsive addresses are being purged as criminals adjust their delivery tactics.

When phishing emails arrive at CSO or CIO, the first thing that stands out is the fact that they’re coming from a domain (usually a business) with a good reputation. This helps avoid email filters, and in some cases added legitimacy to the campaign itself. However, most of the attempts seen by Salted Hash center on IT related communications, which is both good and bad.

The good part of that situation is due to how IT takes care of us at IDG. We know what their emails look like, so when someone pretends to be them and capture our credentials, the attempt is likely going to fall flat.