Security Issues: PhishPoint Cyberattack

On today’s One-Minute Wednesday, we’ll be looking into a new phishing scam that’s targeting Office 365 users called PhishPoint. What hackers do with PhishPoint is email SharePoint invites that contain a malicious link. So, let’s dive into how PhishPoint works and what to do to keep yourself on guard from this attack.

How PhishPoint Attacks

PhishPoint attacks are created by a phony SharePoint document implanted with a link that takes you to a Microsoft login page where you access the document.

SharePoint Document

When the login page opens and your credentials are inserted, the cybercriminal on the other end steals your login information. This type of attack is so dangerous because it can bypass Microsoft’s security system by hiding within a SharePoint document.

Spoofed Login Page

Like with most phishing emails, hackers attempt to gain an unsuspecting user’s trust and the login page they navigate to appears very legitimate. So overall, PhishPoint is a convincing trap that can be easy to fall into if you’re not careful.

Staying on Guard

How can you stay on your guard with something so deceptive? The first thing to do is remain alert; watch out for any emails that read “Urgent”, “Action Required” or contain anything that calls you to input or send sensitive data. Be on the lookout for URLs in the body of your email too, as they can lead to spoofed sites like the Microsoft login page we mentioned. Check to ensure a message coming from within your organization that has any odd sounding language is trustworthy. And if this is your first time receiving an email from a particular sender be sure not to click any unknown links or attachments from them until you can confirm it’s safe. Finally, you should use any Multi-factor Authentication software your company has implemented to secure your account.

Now that you’re aware on what PhishPoint is and how it attacks, you can be prepared to keep you and your personal information secure. Stay safe and be sure to join us for next week’s One-Minute Wednesday!

Share:

More Posts

Cup of IT: Share Files Securely with Microsoft 365

Microsoft 365 offers valuable features and capabilities to ensure your files are protected and are only accessed by the right people. On this episode of Cup of IT, we’ll be discussing how to safely, smartly and easily share and receive files in Microsoft 365.

Cup of IT: Sending Secure Emails with Microsoft 365

Microsoft 365 comes with several built-in security features that allow your organization to manage how sensitive information is handled via email. On this episode of Cup of IT, we’ll be discussing how to send secure emails using sensitivity labels, email encryption, and the do-not-forward options in Microsoft 365.

Clean Your Inbox with Outlook Folders

Using Outlook folders is a great way to begin relieving the stress of managing your inbox. On today’s One-Minute Wednesday, you’ll learn how to create customizable folders that can automatically categorize your email, giving you a better experience with your inbox.

Blocking Senders in Microsoft Outlook

Tired of junk mail getting past your built-in spam filter? You can quickly and easily train your junk folder in Microsoft Outlook. On today’s One-Minute Wednesday, Sean Mountain will show you how to mark email as junk and block senders, giving you more power over what shows up in your inbox!