The Office 365 Users Are Being Targeted Via Malicious Voicemails

In recent weeks there has been a keen observance related to phishing campaigns that have been luring the users to leak their credentials related to office 365. The fake messages via voicemails is a part of 3 varying kits. Although the customer of McAfee who are utilizing Livesafe and MGW are secured from these underhanded campaigns. The attack commences when the user received the email that contains information regarding a phone call they missed. It further asks the users to sign in to the account using their credentials for accessing the voicemail. This mail also comes with an HTML file that comes as an attachment; when the attachment is loaded, it takes or forwards the users to the phishing website. There are few variants In the way the mail appears, some of them also have a recording of audio.

Kits Leak Information Related To The Visitors

The kits come in different names, one of them is the voicemail scmpage, this voicemail operates on the basis of a license key. The license key is verified before the phishy site loads. Further, a text file is made on the website, and that has visitors arranged n a list that comprises the IP information, the browsers used and the date of the visit. The information further gets sourced from the visitors; this data then gets mailed to the phishy site owner. The data includes IP Address, password, location and email. Other kits go by the name of information Hollar, it does the same thing that the previous kit does, which is collecting information of the visitors. The third kit is not yet branded and has no related attributes to it, the kit utilizes the codes that are available from the other kits, it targets the users of adobe, the kit now looks rather modified, and the outdated code has been altered as well.

Jhon Smith is a self-professed security expert; He has been making the people aware of the security threats. His passion is to write about Cyber security, malware, social engineering, Games,internet and new media. He writes for Mcafee products at www.mcafee.com/activate or mcafee.com/activate.

Leave a Reply

Your email address will not be published. Required fields are marked *