Microsoft Outlook shows real contact details in some phishing emails | #emailsecurity | #phishing | #ransomware

Microsoft Outlook is susceptible to phishing attacks using internationalized domain names (IDNs), according to reports from two separate security researchers. 

Phishing attacks sent from IDNs are also known as homograph attacks. They use Unicode characters from non-Latin character sets, such as Cyrillic or Greek, that look like regular Latin characters. An attacker might register the domain tω, which uses an international alternative to a regular ‘w’. 

Browsers have long recognized and flagged IDNs, displaying them in their original Unicode format (known as Punycode), making them easier to spot. The tω IDN would show up as xn–, for example. 

However, researcher dobby1kenobi revealed that Microsoft Outlook does not highlight them. Moreover, if a spoofed email using an IDN resembles a legitimate email address in the recipient’s Outlook contact book – for example, real.person@tω instead of – the software will display the legitimate person’s contact details next to the phishing email. 

For the attack to work, the sender must include the real email address in the ‘Sender’ field, which is trivial. 

“This means if a company’s domain is “somecompany[.]com”, an attacker that registers an IDN such as “ѕomecompany[.]com” (xn–omecompany-l2i[.]com) could take advantage of this bug and send convincing phishing emails to employees within “” that used Microsoft Outlook for Windows,” he reported. 

Related Resource

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

Because a spoofed email address would cause the real employee’s contact details to appear, many employees might be fooled into thinking the email was legitimate. 

Mike Manzotti, senior consultant at security company Dionach, also noted the issue. He reported the same response from Microsoft as dobby1kenobi: 

“We’ve finished going over your case, but in this instance it was decided that we will not be fixing this vulnerability in the current version and are closing this case,” the company said. “In this case, while spoofing could occur, the senders identity cannot be trusted without a digital signature. The changes needed are likely to cause false positives and issues in other ways.” 

However, Manzotti noticed that the latest version of Microsoft Outlook (16.0.14228.20216) is no longer vulnerable. Microsoft was unable to confirm if it had issued a fix, he said. 

Companies with versions of Outlook still susceptible to this flaw can work around the issue by digitally signing their emails and visually classifying all mails from external sources, dobby1kenobi said. 

Featured Resources

The ultimate guide to business connectivity in field services

A roadmap to increased workplace efficiency

Free download

The definitive guide to migrating to the cloud

Migrate apps to the public cloud with multi-cloud infrastructure solutions

Free download

Transform your network with advanced load balancing from VMware

How to modernise load balancing to enable digital transformation

Free download

How to secure workloads in hybrid clouds

Cloud workload protection

Free download

Original Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

three + one =