PhishPoint: A Microsoft SharePoint phishing attack
PhishPoint allows cyber criminals to exploit Microsoft’s email link-scanning. Link-scanning reviews the links in an email’s body but it ignores files hosted on other Office 365 services. Hackers then use SharePoint files to host phishing links. This means they can bypass Office 365 email security measures.
During an attack, the Office 365 user receives an email containing a link to a SharePoint document. The message looks identical to a typical SharePoint collaboration invitation. The email’s hyperlink opens a SharePoint file that mirrors a standard access request to a OneDrive file. This file contains an Access Document link that takes the user to a spoofed Office 365 login screen. If the user attempts to log in, the cyber criminals have his or her credentials.
Phishing is the top cause of data breaches worldwide. We offer a few tips to help protect you and your organization from phishing attacks.
- Hover over a link before you click
- Consider the legitimacy of the content you’re clicking on
- Beware of error-ridden communication
Keeping these three tips in mind should help you combat 90% of the phishing out there. But cyber criminals are savvy and always attempting to stay ahead of the curve. Secant’s digital security experts have industry certifications and the relevant experience to help protect your organization. With services and solutions like SiteCare 360° and Email Defender, you can trust Secant to help you navigate the increasingly daunting security landscape.