By Brittany Llorente
Media Marketing Associate
On Friday, January 19, Greenshades sent an email to our clients notifying them of some phishing attempts that had been made recently in the Microsoft Community. To keep everyone aware, we are posting this email as a blog. We find it is important that everyone stay vigilant against hackers and phishers, particularly during this time of year.
Along with this published email, additional IRS and Greenshades resources can be found on this subject.
Here are some of those resources:
If you have any questions, please email email@example.com
During the last two days, Greenshades Security has been informed of a variety of phishing emails sent to companies in the Microsoft Community. These emails are not targeting Greenshades clients in particular, nor do they appear in any way related to Greenshades. Nonetheless, we wanted to send a reminder to stay diligent regarding email security. Phishers and scammers increase their efforts to take over email accounts during tax season, when they have the best chance of stealing tax forms or other financial information.
Some examples that we have seen include (examples at the bottom of the email):
- Email subject “FYI” with a request to download and review a document, sent using a fake email address but using the CFO’s real name
- Email subject “Dropbox file invoice” asking the recipient to log into a site claiming to be Dropbox in order to view an invoice
When successful, these phishers have shown a pattern of continuing their attack by accessing email accounts of their victims and then sending their phishing emails to the entire address book of the compromised account. This phisher can also use the information from these fake websites to access other accounts and websites such as bank accounts, social media, or other secure data. Be wary of emails with these subjects, or other emails asking you to enter your login credentials, even if the email appears to come from a trusted coworker.
If you or anyone you know has received an email or has typed in any credentials into the fake website, it is highly recommended that you notify your IT department. Furthermore, you should update any passwords that share similar log in credentials.
We have recognized some similar patterns and origins of this phishing attack and the websites that are being created around it. If you would like more technical details about the instances that Greenshades has encountered, please email firstname.lastname@example.org.