Design a site like this with
Get started

Hackers Using Malicious Apps for Accessing Office 365 User Accounts

The office is a reliable product from Microsoft, and it allows several tools for the users to compute the tasks at a much faster speed than manual processes. The office 365 editions is one of the most productive releases from Microsoft and users sometimes have a hard time with Office 365 Setup issues, related to PC configuration or activation of the product. Lately, the office 365 users are facing a more serious threat as the hackers have been found incorporating the use of malicious apps for gaining leverage into the accounts of the users. This was seen on the rise during last month by researchers working at Phish Labs. The attacks often look like a conventional message of phishing that tries to imitate the SharePoint and file sharing platform of One Drive. It is specifically designed and formulated for fooling the users to click on the appearing link on their screen.

Tricky Scam Technique That Fools People

However, upon clicking the users go to the office 365 page, which is official where they sign in to the account. A prompt appears asking them to accept the permission request for the app named 0365 access. Further, the app makes use of the add-ins feature of office 365, here is where it gets confusing, it appears that Microsoft is making the request, the apps and add-ins load without the office store visit. The scam can be prevented by looking at the account details of the sender. The researchers have implied emphasis on making the provisions for security training in the work environment. The Phish Labs have been working hard to track the activities of these mailers who try to trick the users into clicking these links. There is one good thing about it that the users can have a better awareness of the situation by assessing the ins and outs before downloading anything associated with program

Kaylee Smith is a self-professed security expert; she has been making the people aware of the security threats. Her passion is to write about Cyber security, malware, social engineering, Games,internet and new media. She writes for Ms-Office products at or



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this:
search previous next tag category expand menu location phone mail time cart zoom edit close