New Blog Post | Attackers use Morse code, other encryption methods in evasive phishing campaign

%3CLINGO-SUB%20id%3D%22lingo-sub-2642497%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Attackers%20use%20Morse%20code%2C%20other%20encryption%20methods%20in%20evasive%20phishing%20campaign%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2642497%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Fig1b-sample-phishing-email-message.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302841i167E0D97CA8F3CAA%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Fig1b-sample-phishing-email-message.png%22%20alt%3D%22Fig1b-sample-phishing-email-message.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F08%2F12%2Fattackers-use-morse-code-other-encryption-methods-in-evasive-phishing-campaign%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAttackers%20use%20Morse%20code%2C%20other%20encryption%20methods%20in%20evasive%20phishing%20campaign%20%7C%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Foffice-365-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20class%3D%22brand%22%3EOffice%20365%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%3E%26nbsp%3Buses%20multiple%20layers%20of%20dynamic%20protection%20technologies%20backed%20by%20security%20expert%20monitoring%20of%20email%20campaigns.%20Rich%20email%20threat%20data%20from%20Defender%20for%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20class%3D%22brand%22%3EOffice%20365%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3Binforms%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fmicrosoft-365-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20class%3D%22brand%22%3EMicrosoft%20365%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EDefender%3C%2FA%3E%3CSPAN%3E%2C%20which%20provides%20coordinated%20defense%20against%20follow-on%20attacks%20that%20use%20credentials%20stolen%20through%20phishing.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20class%3D%22brand%22%3EMicrosoft%20365%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3BDefender%20does%20this%20by%20correlating%20threat%20data%20from%20email%2C%20endpoints%2C%20identities%2C%20and%20cloud%20apps%20to%20provide%20cross-domain%20defense.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2642497%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Office%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Fig1b-sample-phishing-email-message.png

Attackers use Morse code, other encryption methods in evasive phishing campaign | Microsoft Security...

 Microsoft Defender for Office 365 uses multiple layers of dynamic protection technologies backed by security expert monitoring of email campaigns. Rich email threat data from Defender for Office 365 informs Microsoft 365 Defender, which provides coordinated defense against follow-on attacks that use credentials stolen through phishing. Microsoft 365 Defender does this by correlating threat data from email, endpoints, identities, and cloud apps to provide cross-domain defense.

0 Replies