Critical Threat Level
Phishing attacks using fake login pages to steal usernames, passwords, and authentication credentials
Credential harvesting is a phishing technique where attackers create fake login pages that mimic legitimate websites (Microsoft Office 365, Google Workspace, banking sites, etc.) to steal usernames and passwords when victims attempt to log in.
The attack typically begins with an email that creates urgency—account locked, security alert, password expiration—and includes a link to what appears to be the real login page. When victims enter their credentials, the information is captured by attackers and used for account takeover, data theft, or sold on the dark web.
Attacker sends email claiming: "Your password expires today", "Unusual sign-in activity detected", "Your account will be deleted", or "Important document requires login to view"
Link leads to lookalike website (microsoftonline-login.com instead of microsoft.com, or accounts-google.com instead of google.com). Page looks identical to real login.
When victim enters username/password, credentials are sent to attacker's server. Victim may see error message or be redirected to real site, unaware credentials were stolen.
Attacker uses credentials immediately (before password reset) or sells them. Average time from harvest to use: 8 hours. MFA bypass attempted if enabled.
Microsoft Office 365 Credential Phishing (Ongoing Campaign)
From: Microsoft Security <no-reply@microsoft-account-security[.]com>
Subject: Unusual sign-in activity detected
"We detected unusual sign-in activity on your Microsoft account. For your security, we've temporarily suspended your account. Click here to verify your identity and restore access: https://login-microsoftonline[.]com/verify"
Red Flags:
Before clicking any link in an email requesting login, use HeaderScope to analyze the email headers and verify authentication results. Credential phishing emails typically fail SPF/DKIM checks.
Analyze Email Headers →