- Content source
- https://x.com/alitajran/status/1979166321704141011
Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant. What makes this particularly sneaky is that they are using Microsoft URLs.
The link they receive is http://forms.office.com followed by a value. Clicking that takes them to a strange URL with a PDF, which they then have to log in with their M365 account. And that's where the real danger lies.
The URL ends in http://windows.net and is therefore considered valid. If you log in and the URL isn't http://login.microsoftonline.com, you can assume it's a bad one.
Block the endpoint *.blob.core.windows.net entirely, and only allow access to the specific storage account you trust, like:<storage-account-name>.blob.core.windows.net
Now that you're aware of this, please also set up company branding in your Microsoft 365 tenant! It helps users trust the sign-in page. When they see your logo and colors, they know it's safe. If they see a random portal, they'll think twice before entering their credentials!
Read more: https://learn.microsoft.com/en-us/entra/fundamentals/how-to-customize-branding#Microsoft365 #EntraID #CloudSecurity #IdentityProtection
Last edited: