Office 365 Phishing Campaign Exploits Legitimate Domains
One clever campaign discovered by Check Point Research was found to use legitimate domains coupled with legitimate Adobe Campaign redirection and Oxford University email addresses as the source. It all started with the fake missed voice message emails, that I'm sure most of us received, The Check Point Research article is worth a read and really well written. More Info ....
reCAPTCHA - I am not a robot
Bypassing Email Defences of SPF, DKIM and DMARC
Anand Chetan of Armorblox reports on how a recent Bank of America phishing campaign used simplicity and authenticity to bypass the usual security measures. The email was well crafted for receipt by just a few users, although the sender name was impersonated, the email address was a legitimate Yahoo address and therefore passed the usual checks. The phishing domain was also legitimate having been created a few days prior and was not yet identified as rogue.
Covid-19 Phishing Trends
Some Other Phishing Highlights This Week
Furloughed workers and the dormant phishing threat. A concern was raised this week that once furloughed workers open their inboxes after several months of build up, they may be more likely to open phishing emails in their haste to catch up
North Korea BEC Scams. At The ESET Virtual World Security Conference, ESET researcher, Jean-lan Boutin disclosed that the North Korean Lazarus Group are attempting to steal money from targets they initially breached for espionage.
Covid-19 Themed Campaigns Down. The Microsoft Threat Protection Intelligence Team report that the Covid-19 themed campaigns are significantly down on the March peak. More Info...

How to Pre-Pend a Warning to Office 365 Emails - CND News and Blog
