![]() ![]() The location, IP address, and sender email address of the email that you received may differ in your case. The email also displays the browser and OS platform, along with the date and time the account was accessed. Fake Microsoft Account Unusual Sign-in Activity EmailsĪs per the above email, the account was accessed from the United States with a given IP address. If this was you, we’ll trust similar activity in the future. If this wasn’t you, please report the user. We detected something unusual about a recent sign-in to the Microsoft account detailsĪ user from the United States just logged into your account from a new device. This email landed in the Junk Email folder of my Microsoft Account as it failed to pass the security checks. Let me show you an example of a fake Microsoft Account unusual sign-in activity email and the details included in such emails. Fake Microsoft Account Unusual Sign-in Activity Emails The goal of this article is to help my readers and make them aware of such fake Microsoft emails and prevent account hacks that are being attempted by attackers every moment. Therefore, it is crucial to understand how to tell these fake emails apart from real emails, which I will explain in more detail in the following section of this article. These unusual sign-in activity fake emails have nearly identical information fields and even the same sender address as the real email notifications sent by Microsoft. Read how to secure your email account from hackers. Actually, the main goal of sending these strange Sign-in Activity emails is to persuade users to click the links in the email. I’m sure that a number of account users received these emails, and the attacker intended to trap some of them in order to access their email accounts. The real emails from Microsoft always appear in the Inbox folder, while the fake emails typically land in the Junk Email folder, which is crucial. Microsoft never sends such phishing emails if your account has not been successfully signed in. The emails are so convincingly real-looking that it’s impossible to tell which ones are fake.Īnyone would assume this is being sent by the Microsoft Accounts Team based on the sender address, email composition, and other details. In the last few weeks, I’ve been getting a lot of these emails about unusual sign-in activity. These unusual sign-in activity emails from a fake Microsoft account are dangerous, and you shouldn’t click any of the links in the email. As the employees think they are operating within a secure environment and receiving emails from known associates, the scam is very effective, especially when combined with the inbox rules employed here by the attacker.Recently, a lot of people have been getting emails about unusual sign-in activity on their Microsoft accounts. Emails are then sent asking for large sums of money to be wired to them under the guise of a legitimate and convincing payment demand (known as a business email compromise (BEC) campaign). Once access was established, the attacker uses inbox rules to hide their activity while searching for as many co-workers and business partners to make contact with. Overview of AiTM phishing campaign and follow-on BECĪccording to a security blog post (Opens in a new window) by the Microsoft 365 Defender Research Team, at least some of the targeted organization are using multifactor authentication (MFA), but the type of MFA used wasn't good enough to stop the attacker bypassing it and gaining access, "In multiple cases, the cookies had an MFA claim, which means that even if the organization had an MFA policy, the attacker used the session cookie to gain access on behalf of the compromised account." How to Set Up Two-Factor Authentication.How to Record the Screen on Your Windows PC or Mac.How to Convert YouTube Videos to MP3 Files.How to Save Money on Your Cell Phone Bill.How to Free Up Space on Your iPhone or iPad.How to Block Robotexts and Spam Messages. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |