This article has been created to explain what is the Office365 scamming redirect which aims to steal your Office365 credentials from your computer.
A new form of phishing attack has been detected to be introduced in the same theme as ProtonMail, but display prompt that asks the victim to enter his or hers Office365 credentials to login. The phishing is believed to originate from a suspicious browser extension, an unwanted program installed on the victim’s computer that displays advertisements or even a Trojan type of malware with adware capabilities. If you see the Office365 popping up on your web browser, we do advise that you focus on immediately taking actions towards removing this scam from your computer.
|Name||Office365 "Virus" Page|
|Type||Phishing Redirect / Unwanted Program|
|Short Description||Aims to modify the settings on your web browser in order to get it to cause browser redirects to a fake Office365 login page.|
|Symptoms||Your browser may experience automatic redirects to a web page that asks you to sign in Office365 with your username and password..|
|Distribution Method||Bundled downloads. Web pages which may advertise it.|
|Detection Tool|| See If Your System Has Been Affected by Office365 "Virus" Page |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Office365 "Virus" Page.|
Office365 “Virus” – How Did I Get It
One of the main way via which programs that cause redirects to web pages, like the Office365 scam is believed to be via software bundling operations. These types of activities often involved third-party programs that are often downloaded by users. Such programs include drivers, media players, downloaders, converters and any other free helper program you can think of. They often come embedded with ad-supported programs and PUPs which are cleverly masked as a seemingly legitimate software that is added to the installers of those programs. One such software may be the one which introduces the Office365 phishing screens on the victim PCs. But it is not easy to detect those programs when you install freeware, since they are often concealed well within the “Advanced” or “Custom” installation modes.
Another method and scenario via which the Office365 may be spread on your computer system is if you have tried to download a document by clicking on a web link and have received the following notification:
Such web links may be sent to your via e-mail to pretend to lead you to the online viewing of any form of seemingly important document from the likes of an invoice, receipt or something urgent.
Office365 Phishing “Virus” – Analysis
Once installed on your computer, the Office365 redirect virus may immediately start to modify various different aspects of your computer. The software may create scheduled tasks or modify the Windows Registry Editor so that it runs some particular files automatically on system boot.
In addition to modifying Windows, the Office365 redirect PUP may also heavily modify your web browser and change your home page, new tab page and other segments of your browser so that you use suspicious third-party search engines in order to see different advertisemetns.
In addition to this, the Office365 pop-up “virus” may also introduce various types of tracking technologies on your web browser with the purpose to obtain your:
- Online search history.
- Online browsing history.
- Online clicks.
- Keystrokes you entered on your browser.
- Ads you have clicked on.
These technologies may be used by the Office365 “Virus” in order to cause different types of advertisements on your computer. The main one of those is the fake Office365 login page, which resembles the one used by ProtonMail. The page appears like the following:
But Office365 is not the only target of the cyber-criminals who are behind this phishing attack. They also add other forms of Sign In, hopefully to steal your credentials of other services you might be tricked into logging in. The main imitation of these phishing messages is the anonymous e-mail service protonmail and the sign-in screen even adds ©2017 PROTONMAIL.COM underneath it in order to increase trust:
If you see the following screen, it is very important not to entery any usernames and passwords in it and immediately check your computer for malware to make sure that it is protected and you do not see any more phishing attempts on your credentials.
How to Remove and Stop Office365 Phishing Attempts
In the event that you have seen fake Dropbox, Facebook, Protonmail, and other types of fake e-mails that have transferred you to those fake web pages, it is extremely important that you make the necessary changes to stop spam messages in the future. In order to learn how you can do that, we recommend that you read the related article underneath which aims to help you stay protected against phishing and malicious e-mails in the future:
However, if you also see automatic browser redirections on your computer that directly lead you to web pages, like the fake Office365 login page, it is urgent that you follow the removal instructions underneath to remove any potentially unwanted program or malware that may be causing these phishing pages to appear. If manual removal instructions do not work and you still experience advertisements and redirects, it is recommended to run a scan using a professional anti-malware software on your PC. It will automatically scan your computer and locate any malware or adware that may currently be residing on your computer.