New Blog Post | Microsoft delivers comprehensive solution to battle rise in consent phishing emails

%3CLINGO-SUB%20id%3D%22lingo-sub-2549252%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Microsoft%20delivers%20comprehensive%20solution%20to%20battle%20rise%20in%20consent%20phishing%20emails%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2549252%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Fig2-Consent-phishing-attack-chain-b.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F295913i6CBB8E747417756F%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Fig2-Consent-phishing-attack-chain-b.png%22%20alt%3D%22Fig2-Consent-phishing-attack-chain-b.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F07%2F14%2Fmicrosoft-delivers-comprehensive-solution-to-battle-rise-in-consent-phishing-emails%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20delivers%20comprehensive%20solution%20to%20battle%20rise%20in%20consent%20phishing%20emails%20%7C%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20blog%20offers%20a%20look%20into%20the%20current%20state%20of%20consent%20phishing%20emails%20as%20an%20initial%20attack%20vector%20and%20what%20security%20administrators%20can%20do%20to%20prevent%2C%20detect%2C%20and%20respond%20to%20these%20threats%20using%20advanced%20solutions%20like%20Microsoft%20Defender%20for%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20class%3D%22brand%20x-hidden-focus%22%3EOffice%20365%3C%2FSPAN%3E%3CSPAN%3E.%20Consent%20phishing%20attacks%20aim%20to%20trick%20users%20into%20granting%20permissions%20to%20malicious%20cloud%20apps%20in%20order%20to%20gain%20access%20to%20user%E2%80%99s%20legitimate%20cloud%20services.%20The%20consent%20screen%20displays%20all%20permissions%20the%20app%20receives%3B%20and%20because%20the%20cloud%20services%20are%20legitimate%2C%20unsuspecting%20users%20accept%20the%20terms%20or%20hit%20%E2%80%98enter%2C%E2%80%99%20which%20grants%20the%20malicious%20app%20those%20requested%20permissions.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2549252%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Office%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Fig2-Consent-phishing-attack-chain-b.png

Microsoft delivers comprehensive solution to battle rise in consent phishing emails | Microsoft Secu...

This blog offers a look into the current state of consent phishing emails as an initial attack vector and what security administrators can do to prevent, detect, and respond to these threats using advanced solutions like Microsoft Defender for Office 365. Consent phishing attacks aim to trick users into granting permissions to malicious cloud apps in order to gain access to user’s legitimate cloud services. The consent screen displays all permissions the app receives; and because the cloud services are legitimate, unsuspecting users accept the terms or hit ‘enter,’ which grants the malicious app those requested permissions.

0 Replies