Cybercriminals abuse Microsoft Dynamics 365 in phishing attacks
Microsoft services allow you to create forms with embedded links, a feature that phishers take advantage of. Since the service is legitimate, users feel safe when opening these links.
See example: https://app.any.run/tasks/b98c9525-1d5b-49c0-95c1-34a2048e14dc/
Our team followed the trail of R2 buckets and took on the challenge of finding even more trusted domains being misused as phishing lures.
With TI Lookup, we uncovered a link that tricked users into attempting to access a non-existent PDF file hosted on a legitimate Microsoft website.
Phishing URL:
hxxps://customervoice.microsoft[.]com/Pages/ResponsePage.aspx?id=N_pyUL0QJkeR_KiXHZsVlyTB1Qoy7S9IkE8Ogzl8coFUNVIzNlI5MEhCNlBPRFMwMklUV0JZVTkxVS4u
Use this TI Lookup query to find samples employing this technique:
https://intelligence.any.run/analysis/lookup