Voicemail: Microsoft Dynamic 365 abused for phishing

Voicemail: Microsoft Dynamic 365 abused for phishing

Share post

Cyber ​​criminals use legitimate Microsoft Dynamic 365 Customer Voice software to send phishing links to steal customer data. Security researchers from Avanan and CheckPoint show how insidious the whole thing is.

Dynamics 365 Customer Voice is a Microsoft product primarily intended to receive feedback from customers. It can be used for customer satisfaction surveys to track feedback and aggregate data into actionable insights. Additionally, it can also be used to interact with over the phone, collecting the data for further customer input. Instead of using this feature to collect customer feedback, cyber criminals are now trying to steal their data.

Static Expressway bypasses security scanners

They take advantage of the so-called Static Expressway, a technique that legitimate websites exploit to bypass security scanners. The logic is this: security services cannot simply block Microsoft - otherwise it would be impossible for all users of Microsoft services to do their job. Instead, these links from trusted sources are usually automatically trusted. This has given cybercriminals an opportunity to sneak in.

Similar examples of this can be found on Facebook, PayPal, QuickBooks or others. It's incredibly difficult for security solutions to figure out what's real and what's behind the seemingly legitimate link. Also, while many services recognize a link from a known address, they do not scan it by default.

Phishing link is not recognizable

🔎 The link to the voice mail looks safe - but then leads to a phishing page (Image: Avanan).

This is a particularly tricky attack as the phishing link only appears in the last step. Users are first redirected to a legitimate page - so hovering over the URL in the email body offers no protection. In this case, it's important to remind users to pay attention to all URLs, even if they're not in an email. These attacks are very difficult for scanners to stop and even more difficult for users to detect.

To protect against these attacks, users can do the following:

  • Thoroughly review all URLs, including those that aren't in the body of the email.
  • If you receive an email with a voicemail, make sure it's a known type of email before engaging in it.
  • If you're unsure about an email, ask the original sender on another communication channel.
More at Avanan.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more