Hackers Have Found a Clever New Way to Steal Your Microsoft 365 Credentials
Static Web Apps are the latest weapon in the scammer arsenal
Cybercriminals have started using Static Web Apps, an Azure service, in their phishing attacks against Microsoft365 users.
These features have been used by threat actors to host static landing phishing pages, the researchers are now saying. These landing pages look almost identical to official Microsoft services, with the company logo, and the Single SignOn (SSO) option that harvests Office 365, Outlook, or other credentials.
Reporting on the findings, BleepingComputer says using Azure Static Web Apps to target Microsoft users is an “excellent tactic”, as each landing page gets its own secure page padlock in the address bar, due to the *.1.azurestticapps.net wildcard TLS certificate.
With such a TLS certificate, even the most suspicious of victims could be tricked.
It also makes the landing pages good for targeting users on other platforms and other email providers, as these victims could also be fooled by the fake security assurance of the legitimate Microsoft TLS certificate.
Usually, when a person is suspecting a phishing attack, they’d check the URL they’re being invited to click. Using Azure Static Web Apps renders this advice useless, as many will most likely be fooled by the azurestticapps.net, and think the identity is legitimate, the publication concludes.
Azure Static Web Apps Microsoft’s tool that helps developers build and deploy full stack web apps to Azure, from a code repository.
Microsoft is silent on the matter, for the time being.