Page 109 - Cyber Defense eMagazine February 2024
P. 109

After inserting their email address on the spoofed login page, users were redirected again; this time to
            the legitimate login.live.com – Microsoft’s real login page. The threat actor then set a session cookie on
            the user’s device during the redirection process, allowing visibility into victims’ credentials and, in turn,
            easily accessing their accounts.


            Microsoft quickly mitigated the issue soon after the incident response team shared their findings with
            Microsoft’s security team.




            Gone Phishing

            This sophisticated quishing campaign exploiting Microsoft’s open redirect vulnerabilities is a testament
            to the ever-evolving, increasingly sophisticated nature of phishing attacks.


            Organizations must stay vigilant – regularly updating security protocols and educating teams to better
            recognize the nascent ways cybercriminals exploit and circumvent the latest cybersecurity frameworks.

            To paraphrase the old adage, there’s always a bigger phish to phry.






            About the Author

            Elad  Damari  is  a  Cyber  Expert  and  Incident  Response  Team  Leader  at
            Perception Point. There, he leads the team in identifying and reducing cyber
            risk for enterprises globally. Elad can be reached online through his LinkedIn
            (https://www.linkedin.com/in/elad-damari)  and  at  our  company  website
            https://perception-point.io


























            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          109
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   104   105   106   107   108   109   110   111   112   113   114