{"id":32157,"date":"2022-06-20T09:00:00","date_gmt":"2022-06-20T14:00:00","guid":{"rendered":"https:\/\/thelogicgroup.com\/?p=32157"},"modified":"2022-08-18T15:10:42","modified_gmt":"2022-08-18T20:10:42","slug":"hackers-are-targeting-office-365-phishing","status":"publish","type":"post","link":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/","title":{"rendered":"Hackers Are Targeting Office 365 With Phishing Scams"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-31dxy71-9b84fcbb39a79c5e9e4484827071785d\">\n.avia-section.av-31dxy71-9b84fcbb39a79c5e9e4484827071785d{\nbackground-color:#3187bc;\nbackground-image:unset;\n}\n<\/style>\n<div id='amg-diagonal-overlay'  class='avia-section av-31dxy71-9b84fcbb39a79c5e9e4484827071785d header_color avia-section-large avia-no-border-styling  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  avia-bg-style-scroll av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'   data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32157'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2cp62cd-2ccd98e1d89f5a8c121af61d37c9311c\">\n.flex_column.av-2cp62cd-2ccd98e1d89f5a8c121af61d37c9311c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2cp62cd-2ccd98e1d89f5a8c121af61d37c9311c av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2f08t-b57f64300aab930dea6f66199dc0341d\">\n#top .av-special-heading.av-l2p2f08t-b57f64300aab930dea6f66199dc0341d{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-l2p2f08t-b57f64300aab930dea6f66199dc0341d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p2f08t-b57f64300aab930dea6f66199dc0341d .av-subheading{\nfont-size:23px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p2f08t-b57f64300aab930dea6f66199dc0341d av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  avia-builder-el-no-sibling  av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Hackers Are Targeting Office 365 With Phishing Scams<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32157'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-27ets8t-8b28165093a7159918f3307cdeedef46\">\n.flex_column.av-27ets8t-8b28165093a7159918f3307cdeedef46{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-27ets8t-8b28165093a7159918f3307cdeedef46 av_one_full  avia-builder-el-3  el_after_av_section  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2fcpn-76139f4726d2e7a23fa4cfd382eb7241\">\n.avia-image-container.av-l2p2fcpn-76139f4726d2e7a23fa4cfd382eb7241 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-l2p2fcpn-76139f4726d2e7a23fa4cfd382eb7241 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-l2p2fcpn-76139f4726d2e7a23fa4cfd382eb7241 av-styling- avia-align-center  avia-builder-el-4  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-31959 avia-img-lazy-loading-not-31959 avia_image ' src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1-1210x423.jpg\" alt='' title='June-Blog-1'  height=\"423\" width=\"1210\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1k1v09p-3c5a32608000895c83b2d69c3196a337\">\n#top .hr.hr-invisible.av-1k1v09p-3c5a32608000895c83b2d69c3196a337{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-1k1v09p-3c5a32608000895c83b2d69c3196a337 hr-invisible  avia-builder-el-5  el_after_av_image  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2fr47-00c5300590441342b238f5554b37befd\">\n#top .av_textblock_section.av-l2p2fr47-00c5300590441342b238f5554b37befd .avia_textblock{\nfont-size:20px;\n}\n<\/style>\n<section  class='av_textblock_section av-l2p2fr47-00c5300590441342b238f5554b37befd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span style=\"font-weight: 400;\">In the context of information technology, <\/span><span style=\"font-weight: 400;\">social engineering<\/span><span style=\"font-weight: 400;\"> is a dangerous form of manipulation. It is often used to get people to divulge confidential information that can range from login credentials to credit card numbers. One of the most prevalent forms of <\/span><span style=\"font-weight: 400;\">social engineering<\/span><span style=\"font-weight: 400;\"> in the IT world is <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\">. No business is immune from being targeted by these malicious attacks, but it seems we\u2019re seeing an increase in <\/span><span style=\"font-weight: 400;\">Microsoft Office 365 phishing<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2g1qi-5b61f1e20ee2d801e32937a0152fc7d3\">\n#top .av-special-heading.av-l2p2g1qi-5b61f1e20ee2d801e32937a0152fc7d3{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2p2g1qi-5b61f1e20ee2d801e32937a0152fc7d3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p2g1qi-5b61f1e20ee2d801e32937a0152fc7d3 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2p2g1qi-5b61f1e20ee2d801e32937a0152fc7d3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p2g1qi-5b61f1e20ee2d801e32937a0152fc7d3 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-7  el_after_av_textblock  el_before_av_textblock  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >The New Office 365 Phishing Scam To Look Out For<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p2gj6k-eb80f08110134d1a00511547ee21352e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Recently, phishers have been sending specialized links to Microsoft Office 365 users. These links take the user to a login page. After the login details are submitted, the page prompts the user to install a malicious application. This malware grants the hacker persistent access to your emails and files.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Specifically, the way this attack is carried out is through an email. The link in the email doesn\u2019t take you to a suspicious website; it takes you to the official Office 365 login page. Once logged in, you might see a legitimate-looking pop up asking for permissions for a known and trusted application\u2014like Sharepoint. If you click approve, the attacker is able to bypass <\/span><span style=\"font-weight: 400;\">s<\/span><span style=\"font-weight: 400;\">e<\/span><span style=\"font-weight: 400;\">curity<\/span><span style=\"font-weight: 400;\"> measures\u2014including multi-factor authentication\u2014because the user gave the phisher permission.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-18the71-c13933cb3e48e517ea73fc06e48668f1 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2he4v-b52f090548b0f397b7a1d89962f06984\">\n#top .av-special-heading.av-l2p2he4v-b52f090548b0f397b7a1d89962f06984{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p2he4v-b52f090548b0f397b7a1d89962f06984 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p2he4v-b52f090548b0f397b7a1d89962f06984 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p2he4v-b52f090548b0f397b7a1d89962f06984 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p2he4v-b52f090548b0f397b7a1d89962f06984 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-10  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What Is Spear Phishing?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p2i03z-403d64a4779f1406d1dd2ea954670c2a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">The one thing that makes <\/span><span style=\"font-weight: 400;\">social engineering<\/span><span style=\"font-weight: 400;\"> so scary is it\u2019s specifically designed to prey on the natural helpfulness of people or exploit their perceived personality weaknesses. This is particularly troubling for businesses as employees can unwittingly undermine security efforts. The strength of your company\u2019s cybersecurity doesn\u2019t mean much when it\u2019s your employees who are compromising your network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As mentioned earlier, <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\"> is a form of <\/span><span style=\"font-weight: 400;\">social engineering<\/span><span style=\"font-weight: 400;\">. Like in this new story, <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\"> can easily be used to trick employees into doing the cybercriminal\u2019s dirty work. However, what Office 365 users are experiencing isn\u2019t just simple <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\">, it\u2019s a more advanced version of the attack. This type of <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\"> is known as <\/span><span style=\"font-weight: 400;\">spear phishing<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can consider <\/span><span style=\"font-weight: 400;\">spear phishing<\/span><span style=\"font-weight: 400;\"> as a subsection of <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\">. While it uses a similar strategy to <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\">, this version of the attack is aimed at a specific individual or group. Before performing this attack, a hacker usually gathers information on the target to make the message more convincing.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2ib46-ec6cdb5bdee2f1530ed7fc15c6f1144d\">\n#top .av-special-heading.av-l2p2ib46-ec6cdb5bdee2f1530ed7fc15c6f1144d{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p2ib46-ec6cdb5bdee2f1530ed7fc15c6f1144d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p2ib46-ec6cdb5bdee2f1530ed7fc15c6f1144d .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p2ib46-ec6cdb5bdee2f1530ed7fc15c6f1144d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p2ib46-ec6cdb5bdee2f1530ed7fc15c6f1144d av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-12  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Microsoft 365 Security and Awareness Training<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p2inr9-55f6f3a9e0e991ee3b588faf8cbc4623 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Now that you know the danger Microsoft 365 owners face, it\u2019s time to talk about what you can do to protect yourself and your team. The first step to remaining secure is to build awareness around the issue. Explain to your staff why <\/span><span style=\"font-weight: 400;\">phishing<\/span><span style=\"font-weight: 400;\"> scams are dangerous and that businesses are a prime target for these attacks. From there, you should create a security awareness program that trains your employees on how to spot and avoid cyber risks.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2j19t-08913b5863d6339e7a3a82d9c693ac26\">\n#top .av-special-heading.av-l2p2j19t-08913b5863d6339e7a3a82d9c693ac26{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p2j19t-08913b5863d6339e7a3a82d9c693ac26 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p2j19t-08913b5863d6339e7a3a82d9c693ac26 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p2j19t-08913b5863d6339e7a3a82d9c693ac26 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p2j19t-08913b5863d6339e7a3a82d9c693ac26 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What Goes Into an Awareness Program?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p2jjkn-a88913fda7964c1c349eb9f38e1f8e17 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">A security awareness program should include four key elements: communication, checklists, content, and controls.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Communication:<\/b><span style=\"font-weight: 400;\"> Security needs to be an ongoing conversation throughout your organization. Upper management needs to regularly communicate to all employees that cybersecurity is essential to your business.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Checklists:<\/b><span style=\"font-weight: 400;\"> Checklists serve as a way to ensure that cybersecurity best practices are being followed. With a checklist, your company can stay organized when developing, delivering, and maintaining a security awareness program.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Content:<\/b> <span style=\"font-weight: 400;\">Security awareness training<\/span><span style=\"font-weight: 400;\"> should be coupled with supporting content. Items like a security handbook, role-based guides, and more can provide a much needed reference for employees who want to brush up on their training. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Controls:<\/b><span> When people make mistakes, you are going to need to be prepared. A control is a guardrail that ensures that an individual and the system they\u2019re using can only do what their roles dictate. If they want to go beyond that, they need the appropriate approval. This allows you to more easily contain incidents when they occur.<\/span><\/li>\n<\/ul>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-n8a53x-910c5a76451737b9f8f67266fe9ec13e\">\n.flex_column.av-n8a53x-910c5a76451737b9f8f67266fe9ec13e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-n8a53x-910c5a76451737b9f8f67266fe9ec13e av_one_full  avia-builder-el-16  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p2jvkx-07c3f60cce004190f13535b8be96bff1\">\n#top .av-special-heading.av-l2p2jvkx-07c3f60cce004190f13535b8be96bff1{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2p2jvkx-07c3f60cce004190f13535b8be96bff1 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p2jvkx-07c3f60cce004190f13535b8be96bff1 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2p2jvkx-07c3f60cce004190f13535b8be96bff1 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p2jvkx-07c3f60cce004190f13535b8be96bff1 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-17  el_before_av_textblock  avia-builder-el-first  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Let Us Protect Your Company From Cyber Threats<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p2k80j-be72ec8f9af0fc0d444ae6350d56df83 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">The Logic Group is a full-service IT provider that has delivered first-class IT services to a variety of businesses since 1996. We offer a robust cybersecurity solution we call <\/span><span style=\"font-weight: 400;\">LogiGuard Complete<\/span><span style=\"font-weight: 400;\"> to protect our clients from intrusive cyberthreats. Our service can come a-la-carte or bundled depending on your business needs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact us today to learn more about our LogiGuard Complete solution.<\/span><\/p>\n<\/div>\n<\/div><\/section><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":31959,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[48,45,44,47,46],"class_list":["post-32157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-microsoft-365-security","tag-microsoft-office-365-phishing","tag-office-365-with-phishing-scams","tag-security-and-awareness-training","tag-what-is-spear-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beware of Office 365 Phishing Scams | The Logic Group<\/title>\n<meta name=\"description\" content=\"Cybercriminals have turned their eyes toward Office 365 users as their new targets for phishing attacks. Avoid becoming a victim with these steps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware of Office 365 Phishing Scams | The Logic Group\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals have turned their eyes toward Office 365 users as their new targets for phishing attacks. Avoid becoming a victim with these steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T20:10:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wpengine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpengine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\"},\"author\":{\"name\":\"wpengine\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"headline\":\"Hackers Are Targeting Office 365 With Phishing Scams\",\"datePublished\":\"2022-06-20T14:00:00+00:00\",\"dateModified\":\"2022-08-18T20:10:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\"},\"wordCount\":2137,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg\",\"keywords\":[\"Microsoft 365 Security\",\"Microsoft Office 365 phishing\",\"Office 365 With Phishing Scams\",\"Security and Awareness Training\",\"What Is Spear Phishing\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\",\"url\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\",\"name\":\"Beware of Office 365 Phishing Scams | The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg\",\"datePublished\":\"2022-06-20T14:00:00+00:00\",\"dateModified\":\"2022-08-18T20:10:42+00:00\",\"author\":{\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"description\":\"Cybercriminals have turned their eyes toward Office 365 users as their new targets for phishing attacks. Avoid becoming a victim with these steps.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg\",\"width\":2000,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Are Targeting Office 365 With Phishing Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\",\"name\":\"wpengine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"caption\":\"wpengine\"},\"description\":\"This is the \\\"wpengine\\\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.\",\"sameAs\":[\"http:\/\/wpengine.com\"],\"url\":\"https:\/\/thelogicgroup.com\/author\/wpengine\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware of Office 365 Phishing Scams | The Logic Group","description":"Cybercriminals have turned their eyes toward Office 365 users as their new targets for phishing attacks. Avoid becoming a victim with these steps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Beware of Office 365 Phishing Scams | The Logic Group","og_description":"Cybercriminals have turned their eyes toward Office 365 users as their new targets for phishing attacks. Avoid becoming a victim with these steps.","og_url":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/","og_site_name":"The Logic Group","article_published_time":"2022-06-20T14:00:00+00:00","article_modified_time":"2022-08-18T20:10:42+00:00","og_image":[{"width":2000,"height":1250,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg","type":"image\/jpeg"}],"author":"wpengine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"wpengine","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#article","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/"},"author":{"name":"wpengine","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"headline":"Hackers Are Targeting Office 365 With Phishing Scams","datePublished":"2022-06-20T14:00:00+00:00","dateModified":"2022-08-18T20:10:42+00:00","mainEntityOfPage":{"@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/"},"wordCount":2137,"commentCount":0,"image":{"@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg","keywords":["Microsoft 365 Security","Microsoft Office 365 phishing","Office 365 With Phishing Scams","Security and Awareness Training","What Is Spear Phishing"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/","url":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/","name":"Beware of Office 365 Phishing Scams | The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg","datePublished":"2022-06-20T14:00:00+00:00","dateModified":"2022-08-18T20:10:42+00:00","author":{"@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"description":"Cybercriminals have turned their eyes toward Office 365 users as their new targets for phishing attacks. Avoid becoming a victim with these steps.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/June-Blog-1.jpg","width":2000,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/hackers-are-targeting-office-365-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"Hackers Are Targeting Office 365 With Phishing Scams"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93","name":"wpengine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","caption":"wpengine"},"description":"This is the \"wpengine\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.","sameAs":["http:\/\/wpengine.com"],"url":"https:\/\/thelogicgroup.com\/author\/wpengine\/"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=32157"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32157\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/31959"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=32157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/categories?post=32157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/tags?post=32157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}