• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Menu
  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Attacker’s phish Office 365 users with fake voicemail messages

By kamran | At November 3, 2019

Nov 03 2019

Attacker’s phish Office 365 users with fake voicemail messages

The cybercriminal is targeting office 365 constantly as they can get access to high-value company data and systems. The attackers have used a new game to attack office 365 by using an audio file hidden as a voicemail to trick the user and their password.

Office 365 observed the campaign over the past few weeks, and the targeted organization were finance, IT, retail, insurance, manufacturing, infrastructure, energy, government, legal, education, healthcare, and transportation. The targeted staffs were from middle management and executive level. The security experts believe that this is a phishing and whaling campaign.

How the Office 365 phishing campaign works

The recent target was made through an email, which contains Microsoft’s logo and informs the users that they have missed a call from a particular phone number. The email also includes the caller ID, date, call duration, organization name, and reference number.

The message, if opened, redirects the users to a phishing site and asks them to login the account to access the voicemail. During the process, a video is played on the site, which tricks the victim in believing that they are listening to a legitimate voicemail.

After playing the audio, the victims are directed to a rouge website, which mimics to office 365 login pages. Once the victim visits the website, the email address is pre-populated to add to the attack’s credibility. After entering the password, the victim receives a successful login message and redirect to office.com.

Commercial phishing kits used

According to research, it was concluded that the cybercriminals are using three different phishing tools or equipment. These kits are easily available in the underground market and are specially designed for phishing attacks. The popular among them is voicemail Scmpage 2019.

Impact and mitigation for fake voicemail phishing

The indicators for these phishing attempts are that the email has attachments which follow the formats like DD-Month-YYYY wav.html, Voice-DD-MonthYYYYwav.htm or Audio_Telephone_MessageDD-Month-YYYY.wav.html. The website that hosts the fake voicemail pages appear to have randomly generated names.

The cybercriminal used compromised Office 365 credentials because they can get access to a wide range of data and information through a single Microsoft account. The attackers also use the compromised account to trick the employees by pretending to be a senior staff from the same firm. They use it to perform specific actions that result in a financial loss for the company.

Written by kamran · Categorized: Cyber security news, Cyber security threats

Primary Sidebar

Recents post

Your Law Firm Could Be Next — Are You Protected?

Cybercriminals are targeting … [Read More...] about Your Law Firm Could Be Next — Are You Protected?

Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Your clients trust you with … [Read More...] about Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

The first half of 2025 has … [Read More...] about Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (35)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
© 2025 Cyber Security Solutions, Compliance, and Consulting Services - IT Security. All Rights Reserved.
Linkedin-in
Menu
  • Home
  • ABOUT US
  • Blog
  • Compliance Services
  • CONTACT
  • Sectors
Menu
  • Home
  • ABOUT US
  • Blog
  • Compliance Services
  • CONTACT
  • Sectors
  • Privacy Policy
  • Terms of Use
  • Acceptable Use