• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Sway Pages Weaponized to Perform Phishing and Malware Delivery

You are here: Home / General Cyber Security News / Microsoft Sway Pages Weaponized to Perform Phishing and Malware Delivery
September 27, 2022

Danger actors have lately done phishing strategies applying Microsoft Sway and applied the system to distribute malware in companies. 

The findings come from cybersecurity experts at Proofpoint, who launched an advisory about the new menace on Monday.

“An attacker can weaponize a Sway page by either compromising a Microsoft 365 account inside the goal firm (to phish extra users) or making a Sway website page within their individual Microsoft 365 account outdoors the target firm,” reads the technical write–up.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


According to the advisory, most phishing attack vectors noticed by Proofpoint involved clicking a direct hyperlink to a phishing web page. The firm also highlighted that Microsoft typically takes advantage of a warning pop–up to attempt to discourage users from falling prey to these phishing makes an attempt.

“However, Proofpoint cloud security analysis indicates that attackers can phish consumers utilizing an embed approach inside of Microsoft Sway with no a warning pop–up,” the corporation wrote. “This consists of a person clicking on a website link in an embedded malicious doc inside of a Sway webpage.”

More, although Microsoft only allows uploads of media information in Sway pages (and actively blocks uploads of executable data files), there are techniques to use Sway to distribute destructive executables by embedding the hosted malware inside the platform.

This can be finished, as outlined above, by hosting a malicious file on Microsoft OneDrive or SharePoint and embedding it in the new Sway website page. Destructive documents can also be despatched to people within the group, who may possibly open them even although they have malware.

“Threat actors constantly look for new approaches to steal users’ qualifications and acquire accessibility to users’ accounts,” Proofpoint wrote. “As this website illustrates, Microsoft Sway serves as a appropriate system for various types of cloud attacks given that it is a authentic application hosted on a seemingly benign area.”

To mitigate the effect of these threats, Proofpoint recommended organizations educate customers to be mindful of Microsoft Sway–based embedded phishing and malware challenges and, if essential, restrict the usage of Microsoft Sway in cloud environments. 

Companies really should also set up comprehensive account compromise detection using a cloud accessibility security broker (CASB) option and isolate end–user targeted traffic when users click on on links within Microsoft Sway pages.


Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «goto resolve basic review: an smb friendly remote support service GoTo Resolve Basic review: An SMB-friendly remote support service
Next Post: Lazarus Group Targets MacOS Users Seeking Crypto Jobs Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.