Outlook “mail issues” phishing – don’t fall for this scam!

Apart from some slightly clumsy wording (but when was the last time you received an email about a technical matter that was plainly written in perfect English?) and a tiny error of grammar, we thought it was surprisingly believable and worth writing up on that account, to remind you how modern phishers are presenting themselves.
Out are the implied threats, the exclamation points (!!!) and the money ($$$) you might lose if you don’t act right now; in are the happy and unexceptionable “here’s a problem that you can fix all by yourself without waiting for IT to help you” messages of a sort that many companies are using these days to reduce support queuing times.
Yes, you ought to be suspicious of emails like this. No, you shouldn’t click through even out of interest. No, should never enter your email password in circumstances like this.
But the low-key style of this particular scam caught our eye, making it the sort of message that even a well-informed user might fall for, especially at the end of a busy day, or at the very start of the day after.
Here’s how it arrives – note that in the sample we examined here, the crooks had rigged up the email content so that it seemed to be an automated message from the recipient’s own account, which fits with the theme of an automatic delivery error:

Incoming messages for [REDACTED] couldn’t be delivered.
This message was sent in response to multiple incoming messages being rejected consistently from 2:00 AM, Wednesday, August 19, 2020.
To fix, recover and prevent further rejection of emails by our server, connect to your Company-Assigned OWA portal securely below.
Only if you were to dig into the email headers would it be obvious that this message actually arrived from outside and was not generated automatically by your own email system at all.
The clickable link is perfectly believable, because the part we’ve redacted above (between the text https://portal and the trailing /owa, short for Outlook Web App) will be your company’s domain name.
But even though the blue text of the link itself looks like a URL, it isn’t actually the URL that you will visit if you click it.
For the full article: https://nakedsecurity.sophos.com/2020/08/21/outlook-mail-issues-phishing-dont-fall-for-this-scam/
Get In Touch
Share On Social Media
Other Recent Blog Articles
The Exchange Server 2016 & 2019 Deadline is Looming: Don’t Get Left Behind
The writing is on the wall: October 14, 2025, marks the official end of support for Exchange Server 2016 and older versions of 2019. This means no more critical security…
Read MoreGrubhub Data Breach: A Wake-Up Call for Businesses
The recent Grubhub data breach, exposing customer information like names, emails, and partial credit card details, serves as a stark reminder of the ever-present threat of cyberattacks. This incident underscores…
Read MoreLevel Up Your Gaming Knowledge This Friday!
**On ‘Breaking Down I.T. with Steve,’ we’re diving headfirst into the world of graphics cards. 💥 Learn why a high-end GPU is a game-changer for an epic gaming experience. We’ll…
Read More