Mail fraud with Outlook implication

Looks like they are on 365, so log into the Outlook account and go to the settings, follow my instructions above.

Larry, I have a great onboarding list you can have if you message me. I do this for almost all my clients so I know everything before I determine how to fix a problem.
 
Not this time, based oon the header of the sample I received.


Agreed. Maybe we should go back to faxing, like the medical system here. LOL


I'll have to verify that they have 2FA but I think so.
If they have MFA and were compromised on this level, then the machine of the user has malware on it that's forwarding session cookies.

That's nuke and pave territory. EVERY SINGLE DEVICE that person owns, must be nuked and paved. If it runs Android or iOS it needs replacement, factory reset isn't good enough.

What NLine posted is what you do on the M365 side to contain the impacted account. But if you reset passwords and rebuild auth tokens you're right back to square 1 if a trusted machine has malware on it.
 
Larry has been sending me headers. Looks like this is a misspelled domain name. All the legit stuff is based in Canada. The fake is using O365 based in the USA. Very targeted spearphishing campaign here.

Edit nevermind. It is a hacked account.
 
Last edited:
It's at this point that I point out that if M365 is being bought via Godaddy, Godaddy is the reseller of record... and as such Godaddy and its federated authentication system has God level access to the M365 tenant in question.

In other words... if a Godaddy account gets hacked, every Godaddy M365 tenant can get hacked too.

This is why Microsoft REQUIRES MFA for Partner admin accounts, and now demands that all partner tenants have security defaults enabled at least.
 
Back
Top