top of page
  • Writer's pictureSecneurX Threat Analysis

Beware of Microsoft Phishing Page: Protect Your Login Credentials


Phishing attacks continue to pose a significant threat to individuals and organizations worldwide. Analysts at SecneurX have recently conducted an in-depth analysis of a Microsoft phishing page, designed to deceive unsuspecting victims into revealing their login credentials. In this blog post, we delve into the details of this sophisticated attack, highlight the risks involved, and provide guidance on how to protect yourself from falling victim to such scams.

The Anatomy of the Phishing Page

The analyzed phishing page appears remarkably similar to the legitimate Microsoft login page, making it difficult for users to detect its malicious intent. Upon loading the page, it fetches image files from the authentic Microsoft server to create a convincing facade. However, behind the scenes, the page has been crafted to capture users' login credentials discreetly like shown in the image below.

In this blog post, we have taken the below sample for analysis



Microsoft Phishing site hosted on hxxps[://]objectstorage[.]sa-saopaulo-1[.]oraclecloud[.]com/n/grcrplvrg8aa/b/bucket-20230531-2001/o/office[.]html

Data Exfiltration and Compromised Domain

Once an unsuspecting victim enters their password, the data is stealthily posted to a compromised domain controlled by the malware author. In this case, the compromised domain is "hxxps://". It is important to note that the domain used for data exfiltration has been compromised and is under the control of malicious actors, amplifying the risks associated with this phishing campaign.

Understanding the Server Responses

Once the compromised domain receives the posted data, it responds with the message "KOSONG," which is currently configured to be the response as shown in the image below. It is important to note that the server can have different responses based on the HTML source code. These responses may include "VALID," "GAGAL," "KURANG," or "KOSONG," each with its own meaning within the context of the phishing attack.

The Risks and Implications

Phishing attacks of this nature have severe consequences, including unauthorized access to personal accounts, data breaches, identity theft, and even financial losses. The theft of Microsoft login credentials can lead to the compromise of sensitive information, unauthorized activities, and the potential for further attacks against both individuals and organizations.

Protecting Yourself Against Phishing Attacks

1. Stay Vigilant: Be cautious when interacting with emails, messages, or links that request your login credentials. Verify the legitimacy of the sender before providing any sensitive information.

2. Check the URL: Always double-check the URL of the login page to ensure it matches the official website. Look for subtle misspellings, variations, or unfamiliar domains that may indicate a phishing attempt.

3. Enable Two-Factor Authentication (2FA): Implementing 2FA adds an extra layer of security by requiring a second form of authentication, such as a code sent to your mobile device, in addition to your password.

4. Education and Awareness: Stay informed about the latest phishing techniques and best practices for online security. Regularly educate yourself and your employees on how to recognize and avoid phishing scams.

Recommendation: Utilize SecneurX Sandbox for Enhanced Protection

To combat the growing sophistication of phishing attacks, utilizing advanced security solutions is paramount. SecneurX Sandbox, with its powerful analysis capabilities, provides an additional layer of defense against emerging threats. By subjecting suspicious URLs, files, and emails to comprehensive analysis, SecneurX Sandbox detects and blocks malicious activities, safeguarding your digital identity and sensitive information.

Conclusion: Stay One Step Ahead of Phishing Attacks

The analyzed Microsoft phishing page serves as a reminder of the ever-present threat posed by cyber-criminals. Safeguarding your login credentials and personal information requires a proactive approach. By staying vigilant, understanding the techniques employed by phishing campaigns, and leveraging security solutions like SecneurX Sandbox, you can protect yourself and mitigate the risks associated with these malicious attacks. Stay informed, stay cautious, and stay secure.

33 views0 comments

Recent Posts

See All


bottom of page