More specifically, WMC Global cites PhishFeed analysts in their attempt to deconstruct a new phishing scam targeted at Office 365 users, still at the login page.

Detecting the new phishing technique

The new strategy involves inverting the background image colors and thus making it look like the original, however containing a fake login form. The purpose is to avoid being spotted as a malicious attempt and bypass any detection engine. Additionally, this technique supposedly doesn’t make users suspicious and avoid entering their credentials. To make the attempt look even more legitimate, the phishing kit uses a little trick. Namely, the inverted color image is stored by the attackers, then they modify the CSS index.php code to force the color to revert to the original state. Further on, the visitors get the fake page, while the detection engines receive the original one, and more likely wouldn’t notice the scam. What’s more, according to the source: It’s always a good idea to stay on the watch for these scams to avoid falling into the trap. Just a few months ago, a similar phishing attack went for the secure email gateways, trying to lure Office 365 users into accepting a new Terms of Use and Privacy Policy. While it’s hard for the regular user to spot fake log-in pages, staying away from unsolicited links and forms might save you from further trouble. Also using a powerful antivirus with a proven detection rate against phishing attacks, such as Bitdefender, will add to your safety while surfing the Internet. We hope that you haven’t been victim to such a phishing scam; but if you have, you can share your experience with us in the comments below.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ