• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
OCD TECH MICROSOFT PHISHING

Microsoft Phishing Scams Increase

September 27, 2023 Posted by OCD Tech Cybersecurity, IT Security, phishing

Phishing scams involving Microsoft have soared in the past three months, according to research from the security firm Check Point. Moving from third place in Q1 2023 to top spot in Q2. The tech giant accounted for 29% of all brand phishing attempts. A phishing scheme, in which cybercriminals directed deceptive messages toward account holders concerning suspicious transactions on their accounts, could offer a partial explanation for this.

Top phishing Q2 2023

1.Microsoft (29%)

2.Google (19.5%)

3.Apple (5.2%)

4.Wells Fargo (4.2%)

5.Amazon (4%)

6.Walmart (3.9%)

7.Roblox (3.8%)

8.LinkedIn (3%)

9.Home Depot (2.5%)

10.Facebook (2.1%)

Microsoft Unusual Activity

A phishing campaign targeted Microsoft account holders by sending fraudulent messages regarding unusual sign-in activity. The campaign involved deceptive emails which were sent allegedly from inside the company withsender names such as “Microsoft on <company domain>”. The subject line of these phishing emails was “RE: Microsoft account unusual sign-in activity” and they claimed to have detected unusual sign-in activity on the recipient’s Microsoft account. The emails provided details of the alleged sign-in,such as the country/region, IP address, date, platform and browser. To address this supposed security concern, the phishing emails urged recipients to review their recent activity by clicking on a provided link which leads to malicious websites unrelated to Microsoft. The URLs used in the campaign, were designed to steal user credentials or personal information, or to download malicious content onto the user’s device.

Where to report

Your workplace’s IT department. If you received a suspected phishing email in your work email inbox, you should contact a supervisor or your company’s IT department. It is very important that you report the situation promptly–cybercriminals might be targeting your company at large so early detection can be critical in stopping this.

Your email provider. Deleting spam, malicious messages or any other suspicious emails keeps you safe, but you canbolster your cybersecurity by reporting any serious cybercrime attempt to your email client. Manyemail services like Gmail and Outlook make this very easy to do. You can also block senders, so you can ensure a bad actor email account never contacts you again, but bear in mind cybercriminals change email addresses and spoof legit ones.

OCD Tech experts can assist you, contact us!

Tags: IT Securitypersonally sensitive information
Share
0
Avatar photo

About OCD Tech

We provide independent and objective assurance of your IT controls. Using industry recognized frameworks and best practices, we assess your company’s technology risks and evaluate existing controls for risk mitigation. Your business processes are constantly evolving. We ask you, are your IT controls keeping up?

You also might be interested in

Cloud Security Landscape

Cloud Security Landscape 

Mar 22, 2024

We closely monitor the ever-evolving landscape of cloud security in[...]

You only have $10,000 to spend on IT security, where do you spend it?

You only have $10,000 to spend on IT security, where do you spend it?

Jan 17, 2023

Spending money on your business is always a difficult decision,[...]

BEST PRACTICES FOR IT AUDITS

Best Practices for IT Audits

Jun 18, 2024

IT audits have become indispensable for organizations seeking to maintain[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next