{"id":1801,"date":"2023-06-01T00:34:59","date_gmt":"2023-06-01T00:34:59","guid":{"rendered":"https:\/\/www.cyberwissen.net\/?p=1801"},"modified":"2024-03-23T04:01:37","modified_gmt":"2024-03-23T04:01:37","slug":"cybercriminals-stealing-microsoft-passwords","status":"publish","type":"post","link":"https:\/\/cyberwissen.io\/pt\/cybercriminals-stealing-microsoft-passwords\/","title":{"rendered":"Be Careful of Cybercriminals Stealing Microsoft Passwords!"},"content":{"rendered":"<p><img data-opt-id=1723411084  fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-large wp-image-3020\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1024\/h:683\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/06\/8135200_3831994.jpg\" alt=\"\" width=\"1024\" height=\"683\" srcset=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1024\/h:683\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/06\/8135200_3831994-scaled.jpg 1024w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:300\/h:200\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/06\/8135200_3831994-scaled.jpg 300w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:768\/h:512\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/06\/8135200_3831994-scaled.jpg 768w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1536\/h:1024\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/06\/8135200_3831994-scaled.jpg 1536w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1620\/h:1080\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/06\/8135200_3831994-scaled.jpg 2048w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h2>Cybercriminals Are Stealing Your Microsoft Passwords<\/h2>\n<p>Don\u2019t follow any links in emails claiming to be from Microsoft.<\/p>\n<p><a href=\"https:\/\/twitter.com\/troyhunt\/status\/1658239855959343104\/photo\/2\"><span style=\"font-weight: 400;\">A new wave of cybercrime is underway,<\/span><\/a><span style=\"font-weight: 400;\"> with cybercriminals employing cunning tactics to steal your precious passwords. It&#8217;s crucial to remain vigilant and informed to safeguard your digital identity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recently, renowned security consultant Troy Hunt uncovered a distressing phishing campaign that demands your attention. The perpetrators behind this campaign are mimicking Microsoft&#8217;s trusted name to manipulate unsuspecting users. Here&#8217;s what you need to know to stay safe:<\/span><\/p>\n<ol>\n<li><b> Deceptive Emails Alert:<\/b><span style=\"font-weight: 400;\"> Beware of emails masquerading as legitimate communications from Microsoft. These emails claim that your Microsoft Office 365 password is on the brink of expiration. However, falling for this ruse could lead to disastrous consequences.<\/span><\/li>\n<li><b> Luring Links: <\/b><span style=\"font-weight: 400;\">The criminals behind this scheme employ a sneaky strategy. They include a link within their email, which supposedly directs you to a page where you can extend the life of your current password. Do not be fooled! Clicking on this link could set off a series of events that compromise your digital security.<\/span><\/li>\n<li><b> Exploiting Trust:<\/b><span style=\"font-weight: 400;\"> Upon clicking the link, victims are taken to a fraudulent website. This website cunningly prompts users to log into their Microsoft accounts. Once the victims enter their credentials, the cybercriminals gain unauthorised access to sensitive information.<\/span><\/li>\n<li><b> Unmasking the &#8220;Open Redirect&#8221; Technique: <\/b><span style=\"font-weight: 400;\">These cybercriminals are adept at exploiting vulnerabilities. They employ a technique called &#8220;open redirect,&#8221; wherein a seemingly innocent link redirects you to a malicious website. This allows them to seamlessly trick users into divulging their Microsoft passwords.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Stay Safe: Protect Yourself!<\/span><\/h2>\n<ol>\n<li><b> No Link Clicking:<\/b><span style=\"font-weight: 400;\"> If you receive an email that claims to be from Microsoft and urges you to click a link, exercise extreme caution. Refrain from clicking any links within the email, as they could lead you down a treacherous path.<\/span><\/li>\n<li><b> Authentic Password Changes:<\/b><span style=\"font-weight: 400;\"> If you&#8217;re concerned about password expiration policies, take matters into your own hands. Navigate directly to the official Microsoft website by typing in<\/span><a href=\"https:\/\/account.microsoft.com\/\"><span style=\"font-weight: 400;\"> https:\/\/account.microsoft.com<\/span><\/a><span style=\"font-weight: 400;\">. Here, you can securely change your password without falling victim to cybercriminals.<\/span><\/li>\n<li><b> Stay Informed:<\/b><span style=\"font-weight: 400;\"> Knowledge is your armour against cyber threats. Educate yourself about phishing tactics and stay updated on the latest cybersecurity practices. For valuable insights on protecting yourself from phishing, refer to our comprehensive blog post.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In a digital age riddled with cunning cybercriminals, your vigilance is your best defence. Do not let their tactics compromise your security. Be proactive, stay informed, and keep your Microsoft account out of harm&#8217;s way.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals Are Stealing Your Microsoft Passwords Don\u2019t follow any links in emails claiming to be from Microsoft. A new wave of cybercrime is underway, with cybercriminals employing cunning tactics to steal your precious passwords. It&#8217;s crucial to remain vigilant and informed to safeguard your digital identity. Recently, renowned security consultant Troy Hunt uncovered a distressing [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":3018,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/1801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/comments?post=1801"}],"version-history":[{"count":3,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/1801\/revisions"}],"predecessor-version":[{"id":3021,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/1801\/revisions\/3021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/3018"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=1801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/categories?post=1801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/tags?post=1801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}