• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft 365 Phishing Attack Makes Comeback

You are here: Home / General Cyber Security News / Microsoft 365 Phishing Attack Makes Comeback
February 8, 2022

Microsoft 365 end users are remaining tricked into exposing their credentials by a vintage phishing procedure involving mislabeled information. 

In accordance to cybersecurity scientists at Vade, destructive actors are dusting off Proper-to-Still left Override (RLO) attacks to trick victims into executing files with disguised extensions. When victims open up the files, they are prompted to enter their Microsoft 365 login info.

Vade’s danger analyst staff has determined a lot more than 200 RLO attacks on Microsoft 365 people in the last two months. The attack strategy was 

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The RLO character [U+202e] is a specific non-printing character inside of the Unicode encoding process. The character was developed to support languages composed and read through from ideal to left, such as Arabic and Hebrew.

This unique character, which can be identified in the character map on Windows and Linux operating units, can be utilized to disguise a file’s sort. For illustration, the executable file abc[U+202e]txt.exe will show up as abcexe.txt in Windows, leading end users to miscalculation it for a .txt file.

The risk has been all over for more than a ten years and was referenced in 2008 in the Mozilla Foundation and Unicode technical experiences identified as CVE-2009-3376.

“When Appropriate-to-Left Override (RLO) attack is an outdated method to trick consumers into executing a file with a disguised extension, this spoofing technique is again with new reasons,” famous scientists.  

RLO spoofing was the moment a well known strategy for masquerading malware in attachments. Vade researchers said the strategy is now staying made use of for phishing Microsoft 365 company buyers to access a business’ knowledge.

One particular RLO attack noticed by the group concerned an email sent with what appeared to be a voicemail .mp3 attachment. 

“This kind of rip-off preys on the curiosity of the recipient, who is not anticipating a voicemail, and who perhaps intrigued enough to click the phishing hyperlink in the entire body of the email or the attachment, which is typically an html file,” observed researchers.

Clicking on the .mp3 attachment qualified prospects the victim to a spoofed Microsoft login webpage. 

“Most likely attackers are having advantage of the COVID-19 pandemic, with the enlargement of distant performing,” hypothesized the analysts, who also noted that “RLO spoofing attachments is far more convincing with the lack of interpersonal communication because of to teleworking.”


Some components of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News PRC Firm Allegedly Stole Motorola’s Secrets
Next Post: Top Pentagon Cybersecurity Official Resigns Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.