Phishing Examplesīelow are actual screenshots of phishing emails targeting Office 365 users to give you an idea of what this scam looks like. The harvested credentials are used to access anything the victim has access to – cloud storage through One Drive, SharePoint, Skype – the potential for damage is great. Once credentials are gained, the attackers target the victim’s address book which is often filled with business and personal contacts.ĭuring the second stage of attack, they use the first victim’s existing relationships as an ice breaker by using informal subject lines like “FYI” to get the victim to lower their guard and take action.
You get self-service password reset for cloud users free with any Microsoft 365 business, education, or nonprofit paid plan. If you found this video helpful, check out the complete training series for small businesses and those new to Microsoft 365. It’s best to clear your browser history after encountering one of these messages and follow that up with a virus scan. Select All to enable self-service password reset, and then select Save. Your pop-up blocker will not block these alerts.
You might hear pre-recorded audio announcing the alert.You’ll need to end the task via the task manager to close the alert box.
The warning might be partial or full screen, but it will be difficult to close the window and clicking the close button (the X) will not allow you to exit from the popup.
The warning will typically state call Windows support (or tech support, help desk, etc.) now at XXX-XXX-XXXX, but it will rarely say “Microsoft Support”. Some of the signs to watch out for include: As a user – and the last line of defense, it’s important to educate yourself about ways to recognize this scam.