Hackers are using Microsoft Azure Blob Storage to specifically attack Office 365 admins to take over the Office 365 environment. Although windows.net phishing attacks surfaced late last year, this is the first instance we have tracked where hackers are validating the Office 365 credentials and providing an end-to-end genuine experience. Even after being hacked, the most advanced IT admin will not know their account was compromised.
We have seen this attack going specifically after IT managers and Office 365 admins. That’s probably why every step of this attack mimics the Microsoft Office 365 experience: the nickname, the subject, the email body, the Microsoft-owned URL (with a malicious link), the validation of login information, the failed login error messages, and the end-result of a successful login: redirection to the victim’s real Office 365 inbox.
Real-time account compromise attacks open the door for hackers to make instant configuration changes, mailbox deletion, or organization-wide password resets.
Enable Multi-Factor Authentication (MFA) for all users — especially admins.
IT employees should not have admin access for their day-to-day account. It is recommended to have two separate Office 365 accounts: one for admin purposes, another for everyday use.
Educate your users that windows.net, though a Microsoft own domain, is open to anyone. Genuine logins to Office 365 are expected to be in microsoftonline.com
All of the links in the email point to an Azure blob under windows.net, and lead the admin to a spoofed Office 365 login page.
For example:
In standard phishing attacks, submitting to the spoofed login form takes no more than two seconds. In this attack, it takes 10 to 12 seconds, because the PHP script actually validates the credentials against Microsoft.
From our testing of the attack, this is a MSFT log for a login attempt from Italy using an IMAP client. In this account, we also enabled MFA, to demonstrate that it prevents hackers from compromising the account.
After a successful login, the admin never knows they were hacked.
This attack marks a point in phishing evolution. Hackers target IT managers to gain admin access to take full ownership of the domain, apply configuration changes in the admin console, delete mailboxes, forward mail, etc..
User training just became harder. Users who have completed phishing training know that they can confirm if a login form is suspicious by entering fake passwords multiple times. If the page accepts the invalid password, then it’s harvesting credentials. In this attack, that training doesn’t work because fake credentials are not accepted.