Normal view
Microsoft 365 Premium explained: price cuts, but more AI
Copilot options and features
Installing Windows 10 ESUs
Purchasing Windows 10 ESUs
Skynet
Microsoft seizes hundreds of phishing sites tied to massive credential theft operation
Microsoftβs Digital Crimes Unit coordinated the seizure of 338 domains used by RaccoonO365, a financially motivated threat group that developed and sold phishing kits that have been used to steal more than 5,000 Microsoft credentials since July 2024, the company said Tuesday.Β
The threat group, which Microsoft tracks as Storm-2246, enabled cybercriminals to steal credentials from organizations spanning 94 countries, making it the βfastest-growing tool used by cybercriminals to steal Microsoft 365 usernames and passwords,β Steven Masada, assistant general counsel at Microsoftβs DCU said in a blog post.Β
RaccoonO365 services were used indiscriminately to target more than 2,300 U.S. organizations in a tax-themed phishing campaign earlier this year. Its kits, which use Microsoft branding for fraudulent emails, attachments and websites, have also been used against at least 20 U.S. health care organizations, according to Microsoft.Β
βThe rapid development, marketing, and accessibility of services like RaccoonO365 indicate that we are entering a troubling new phase of cybercrime where scams and threats are likely to multiply exponentially,β Masada said.
Microsoft, acting on a court order granted by the U.S. District Court for the Southern District of New York, worked with Cloudflare to seize and take down RaccoonO365βs infrastructure. The company also worked with Chainalysis to trace the threat groupβs cryptocurrency transactions, allowing it to attribute malicious online activity to real identities.
Microsoft accuses Joshua Ogundipe of Nigeria of running the criminal enterprise, which sold phishing kits to a community base of more than 850 members on Telegram. Ogundipe and his associates have received at least $100,000 in cryptocurrency payments, reflecting an estimate of up to 200 subscriptions.Β
βDuring the investigation, the DCU engaged directly with the threat actor without disclosing our identity to acquire the phishing kits,β Maurice Mason, principal cybercrime investigator at Microsoftβs DCU, said in a Q&A with Chainalysis.Β
In a separate purchase, the alleged cybercriminal inadvertently shared a cryptocurrency wallet address for payment that allowed investigators to trace the funds to a wallet hosted on a Nigeria-based cryptocurrency exchange previously linked to Ogundipe, Mason added.Β
Microsoft said Ogundipe has a background in computer programming and accused him of writing the majorityΒ
of the code for the subscription-based phishing service, which allows cybercriminals to send up to 9,000 phishing emails per day. Investigators said RaccoonO365 may have facilitated the transmission of hundreds of millions of malicious emails.Β
Microsoft, which sent a criminal referral for Ogundipe to international law enforcement, also addressed continued discontent with persisting legal challenges.Β
βTodayβs patchwork of international laws remains a major obstacle and cybercriminals exploit these gaps,β Masada said. βGovernments must work together to align their cybercrime laws, speed up cross-border prosecutions and close the loopholes that let criminals operate with impunity.β
RaccoonO365βs kits sent emails to victims with malicious attachments, links or QR codes that redirected users to a fake Microsoft O365 login page to harvest credentials, Cloudflare researchers said in a blog post. When victims entered credentials, the kit allowed attackers to capture the password and resulting session cookie, bypassing multifactor authentication.
The codebase included functions for anti-analysis and evasion, user-agent filtering, security vendor evasion, network-level blocking and dynamic traffic routing, according to Cloudflare.
The phishing emails were often a precursor to malware and ransomware, yet not every stolen credential led to compromised networks or fraud, according to Microsoft. The company said it always expects cybercriminals to try to rebuild operations after a takedown and pledged to take additional steps to dismantle any new or reemerging infrastructure.
The post Microsoft seizes hundreds of phishing sites tied to massive credential theft operation appeared first on CyberScoop.
Do you know all the font options in Microsoft Office?
Word docs forced to OneDrive
Word, Excel, and PowerPoint Web apps
Outlook new vs classic β yet another moment in time
Microsoft, weβre fed up with parentheses!
Master documents in Word
AI is for everyone
-
Black Hills Information Security
- Augmenting Security Testing and Analysis Activities with Microsoft 365 Products
Augmenting Security Testing and Analysis Activities with Microsoft 365 Products
Use of Microsoft 365 products in security testing is not a new concept. For a long time, Iβve incorporated various activities using Office products into my testing regimen. In the [β¦]
The post Augmenting Security Testing and Analysis Activities with Microsoft 365 Products appeared first on Black Hills Information Security, Inc..
Wrangling the M365 UAL with SOF-ELK and CSV Data (Part 3 of 3)
Patterson Cake // PART 1 PART 2 In part one of βWrangling the M365 UAL,β we talked about acquiring, parsing, and querying UAL data using PowerShell and SOF-ELK. In part [β¦]
The post Wrangling the M365 UAL with SOF-ELK and CSV Data (Part 3 of 3) appeared first on Black Hills Information Security, Inc..
Wrangling the M365 UAL with SOF-ELK on EC2 (Part 2 of 3)
Patterson Cake // In PART 1 of βWrangling the M365 UAL,β we talked about the value of the Unified Audit Log (UAL), some of the challenges associated with acquisition, parsing, [β¦]
The post Wrangling the M365 UAL with SOF-ELK on EC2 (Part 2 of 3) appeared first on Black Hills Information Security, Inc..
Wrangling the M365 UAL with PowerShell and SOF-ELK (Part 1 of 3)
Patterson Cake // When it comes to M365 audit and investigation, the βUnified Audit Logβ (UAL) is your friend. It can be surly, obstinate, and wholly inadequate, but your friend [β¦]
The post Wrangling the M365 UAL with PowerShell and SOF-ELK (Part 1 of 3) appeared first on Black Hills Information Security, Inc..
Spoofing Microsoft 365 Like Itβs 1995
Steve Borosh // Why Phishing? Those of us on the offensive side of security often find ourselves in the position to test our clientsβ resilience to phishing attacks. According to [β¦]
The post Spoofing Microsoft 365 Like Itβs 1995 appeared first on Black Hills Information Security, Inc..