TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Spoofing Microsoft 365 Like It’s 1995

Kassie Kimball · 2022-05-24 · Read original ↗

ATT&CK techniques detected

6 predictions
T1566.002Spearphishing Link
99%
"spoofing microsoft 365 like it ’ s 1995 spoofing microsoft 365 like it ’ s 1995 steve borosh / / why phishing? those of us on the offensive side of security often find ourselves in the position to test our clients ’ resilience to phishing attacks. according to the verizon 2021 da…"
T1566.002Spearphishing Link
95%
"as always, it ’ s important to test your infrastructure prior to sending live emails into your target enterprise. for defenders defenders should test the ability to send internal emails via direct send and ensure that any email gateways adhere to the proper mail flow for internal…"
T1566Phishing
92%
"clear, reducing their chances for success. phishing engagements there are several types of phishing engagements often used for testing enterprises. some types are : - click - rate tracking - who clicked? - how many times? - credential harvesting - passwords - cookie theft - paylo…"
T1566.002Spearphishing Link
73%
"reg, scr, vbe, vbs. messages then continue through mail flow rules. finally, messages pass through content filtering ( anti - spam, anti - spoofing ) and are routed accordingly. for a full list of features available by eop, visit : https : / / docs. microsoft. com / en - us / mic…"
T1566.002Spearphishing Link
66%
"it through defenses, all it takes is one user to report the phish and it ’ s back to square one. setting up new infrastructure, creating new pretext, generating new payloads, and sending from a new source all without being detected takes time, and again, patience. what if we coul…"
T1071.003Mail Protocols
40%
"smart host via telnet on port 25 and sends unauthenticated email to internal users. outbound emails are blocked. see the mail flow in the diagram3 below. settings for direct send : - mx endpoint, company - com. mail. protection. outlook. com - port 25 ( yes, 25 ) - tls / starttls…"

Summary

Steve Borosh // Why Phishing? Those of us on the offensive side of security often find ourselves in the position to test our clients’ resilience to phishing attacks. According to […]

The post Spoofing Microsoft 365 Like It’s 1995 appeared first on Black Hills Information Security, Inc..