{"id":18247,"date":"2021-04-21T02:32:50","date_gmt":"2021-04-20T22:32:50","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/office-phishing-html-attachment\/18247\/"},"modified":"2021-04-21T02:33:09","modified_gmt":"2021-04-20T22:33:09","slug":"office-phishing-html-attachment","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/office-phishing-html-attachment\/18247\/","title":{"rendered":"Phishing tricks with Microsoft Office"},"content":{"rendered":"<p>With access to corporate e-mail, cybercriminals can perform <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bec\/\" target=\"_blank\" rel=\"noopener\">business e-mail compromise<\/a>\u2013type attacks. That\u2019s why we see so many phishing letters directing corporate users to sign in to websites fashioned like the MS Office login page. And <em>that<\/em> means it\u2019s very important to know what to pay attention to if a link redirects to a page like that.<\/p>\n<p>Cybercriminals stealing credentials for Microsoft Office accounts <a href=\"https:\/\/www.kaspersky.com\/blog\/office-365-credentials-hunt\/36194\/\" target=\"_blank\" rel=\"noopener nofollow\">is nothing new<\/a>. However, the methods attackers use keep getting more advanced. Today, we\u2019re using a real-world case \u2014 a letter we actually received \u2014 to demonstrate best practices and to outline some of the new tricks.<\/p>\n<h2>New phishing trick: HTML attachment<\/h2>\n<p>A phishing letter normally contains a hyperlink to a fake website. As we say regularly, hyperlinks need careful examination both for general appearance and for the actual Web addresses they lead to (hovering over the URL reveals the target address in most mail clients and Web interfaces). Sure enough, once enough people had absorbed that simple precaution, phishers began replacing links with attached HTML files, the sole purpose of which is to automate redirection.<\/p>\n<p>Clicking on the HTML attachment opens it in a browser. As far as the phishing aspect, the file has just one line of code (javascript: window.location.href) with the phishing website address as a variable. It forces the browser to open the website in the same window.<\/p>\n<h2>What to look for in a phishing letter<\/h2>\n<p>New tactics aside, phishing is phishing, so begin with the letter itself. Here is the actual letter we received. In this case, it\u2019s a fake incoming voice message notification:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/21023259\/office-phishing-html-attachment-letter.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/21023259\/office-phishing-html-attachment-letter.png\" alt=\"A phishing letter\" width=\"714\" height=\"345\" class=\"aligncenter size-full wp-image-18248\"><\/a><\/p>\n<p>Before clicking on the attachment, we have a few questions to contemplate:<\/p>\n<ol>\n<li>Do you know the sender? Is it likely the sender would leave you a voice message at work?<\/li>\n<li>Is it common practice at your company to send voice messages by e-mail? Not that it is used much nowadays, but Microsoft 365 hasn\u2019t supported voice mail since January 2020.<\/li>\n<li>Do you have a clear idea what app sent the notification? MS Recorder is not part of the Office package \u2014 and anyway, Microsofts default sound recording app, which could in theory send voice messages, is called Voice Recorder, not MS Recorder.<\/li>\n<li>Does the attachment look like an audio file? Voice Recorder can share voice recordings, but it sends them as .m3a files. Even if the recording comes from a tool unknown to you and is itself stored on a server, there should be a link to it, not an attachment.<\/li>\n<\/ol>\n<p>In summary: We have a letter from an unknown sender delivering an alleged voice message (a feature we never use) recorded using an unknown program, sent in as an attached Web page. Worth trying to open? Certainly not.<\/p>\n<h2>How to recognize a phishing page<\/h2>\n<p>Suppose you did click on that attachment and landed on a phishing page. How can you tell it\u2019s not a legitimate site?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/21023307\/office-phishing-html-attachment-site.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/21023307\/office-phishing-html-attachment-site.jpg\" alt=\"A phishing web page\" width=\"934\" height=\"738\" class=\"aligncenter size-full wp-image-18250\"><\/a><\/p>\n<p>Here is what to look at:<\/p>\n<ol>\n<li>Does the address bar content look like a Microsoft address?<\/li>\n<li>Do the links \u201cCan\u2019t access your account?\u201d and \u201cSign in with a security key\u201d direct you where they should? Even on a phishing page, they may well lead to real Microsoft pages, although in our case, they were inactive, a clear sign of fraud.<\/li>\n<li>Does the window look right? Microsoft normally has no problems with details such as background image scale. Glitches can happen to anyone, of course, but anomalies should raise a flag.<\/li>\n<\/ol>\n<p>In any case, if you have any doubt, look up <a href=\"https:\/\/login.microsoftonline.com\/\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/login.microsoftonline.com\/<\/a> to see what Microsoft\u2019s actual sign-in page looks like.<\/p>\n<h2>How to avoid getting hooked<\/h2>\n<p>To avoid giving up your Office account passwords to unknown attackers:<\/p>\n<ul>\n<li>Pay attention. Use our questions to avoid the simplest forms of phishing. To learn more tricks, try our <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">modern cyberthreat awareness training courses<\/a>;<\/li>\n<li>Protect employees\u2019 mailboxes with  to expose phishing attempts with hyperlinks or with attached HTML files, and <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security\/cloud?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">endpoint protection<\/a> to prevent the opening of phishing sites.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>If an incoming message asks you to sign in to your MS Office account, here\u2019s what to do. <\/p>\n","protected":false},"author":2598,"featured_media":18252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1815,76],"class_list":{"0":"post-18247","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-e-mail","10":"tag-phishing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/office-phishing-html-attachment\/18247\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/office-phishing-html-attachment\/22765\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/office-phishing-html-attachment\/9049\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/office-phishing-html-attachment\/24606\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/office-phishing-html-attachment\/22634\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/office-phishing-html-attachment\/21707\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/office-phishing-html-attachment\/25117\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/office-phishing-html-attachment\/24448\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/office-phishing-html-attachment\/30580\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/office-phishing-html-attachment\/9559\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/office-phishing-html-attachment\/39446\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/office-phishing-html-attachment\/16817\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/office-phishing-html-attachment\/17360\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/office-phishing-html-attachment\/14700\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/office-phishing-html-attachment\/26549\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/office-phishing-html-attachment\/30581\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/office-phishing-html-attachment\/26945\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/office-phishing-html-attachment\/23812\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/office-phishing-html-attachment\/29140\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/office-phishing-html-attachment\/28938\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18247"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18247\/revisions"}],"predecessor-version":[{"id":18251,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18247\/revisions\/18251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18252"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}