ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft!
Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant.
What makes this particularly sneaky is that they are using Microsoft URLs.
The link they receive is
forms.office.com/ followed by a value. Clicking that takes them to a strange URL with a PDF, which they then have to log in with their M365 account.
And that's where the real danger lies.
The URL ends in
windows.net and is therefore considered valid. If you log in and the URL isn't
login.microsoftonline.com, you can assume it's a bad one.
Block the endpoint *.blob.core.windows.net entirely, and only allow access to the specific storage account you trust, like:
<storage-account-name>.blob.core.windows.net
Now that you're aware of this, please also set up company branding in your Microsoft 365 tenant!
It helps users trust the sign-in page. When they see your logo and colors, they know it's safe. If they see a random portal, they'll think twice before entering their credentials!
Read more:
learn.microsoft.com/en-us/enโฆ
#Microsoft365 #EntraID #CloudSecurity #IdentityProtection