We’re a law firm and subscribe to Office 365. Today we found out that a client of ours was sent an email from my email address (spoofed?) that asked the client to send a wire transfer payment to an unknown bank account. What’s strange is that I can see my original message in my sent items, and that message doesn’t contain the wire transfer request. I had the client send a copy of that email back to me and it’s almost the identical email that I sent him but it was changed slightly and had the wire transfer request information added into my original email. The version of that email that the client received isn’t in my sent items. I started doing some digging and found that a rule had been created that would move messages from that client (and some others) into the ‘rss feeds’ folder.<\/p>\n
Advertisement
I need to lock things down immediately and don’t really know where to begin. I started by changing the user passwords and enabling MFA. We haven’t been running any antivirus/security software other than MS Defender, which security suite would you recommend and other first steps to shut this down.<\/p>","upvoteCount":28,"answerCount":28,"datePublished":"2019-09-05T21:39:52.000Z","author":{"@type":"Person","name":"spiceuser-bfckz","url":"https://community.spiceworks.com/u/spiceuser-bfckz"},"suggestedAnswer":[{"@type":"Answer","text":"
Hello,<\/p>\n
We’re a law firm and subscribe to Office 365. Today we found out that a client of ours was sent an email from my email address (spoofed?) that asked the client to send a wire transfer payment to an unknown bank account. What’s strange is that I can see my original message in my sent items, and that message doesn’t contain the wire transfer request. I had the client send a copy of that email back to me and it’s almost the identical email that I sent him but it was changed slightly and had the wire transfer request information added into my original email. The version of that email that the client received isn’t in my sent items. I started doing some digging and found that a rule had been created that would move messages from that client (and some others) into the ‘rss feeds’ folder.<\/p>\n
I need to lock things down immediately and don’t really know where to begin. I started by changing the user passwords and enabling MFA. We haven’t been running any antivirus/security software other than MS Defender, which security suite would you recommend and other first steps to shut this down.<\/p>","upvoteCount":28,"datePublished":"2019-09-05T21:39:53.000Z","url":"https://community.spiceworks.com/t/ms-outlook-email-hacked-spoofed/728837/1","author":{"@type":"Person","name":"spiceuser-bfckz","url":"https://community.spiceworks.com/u/spiceuser-bfckz"}},{"@type":"Answer","text":"
Honestly, this is becoming a more common “attack” and typically just changing the password on the affected account resolves the issue. Sounds like you did a lot more as well, so you should<\/em> be good to go.<\/p>\n
Beyond everything you’ve done, I’d request that everybody else on your 365 tenant account reset their passwords too. I’d also maybe look into something like Mimecast for filtering out some of the crap and/or end-user training like KnowBe4.<\/p>\n
You did pretty well responding, though. Good job.<\/p>","upvoteCount":10,"datePublished":"2019-09-05T22:03:53.000Z","url":"https://community.spiceworks.com/t/ms-outlook-email-hacked-spoofed/728837/2","author":{"@type":"Person","name":"dimforest","url":"https://community.spiceworks.com/u/dimforest"}},{"@type":"Answer","text":"
I would also recommend changing passwords for other online accounts on the computer and on bank accounts too. You have no idea what other accounts have been compromised on the computer.<\/p>\n
I would also think about a disclaimer to your emails that you never request “change of bank details” via email request, or require direct confirmation for any “change of bank details”. Then I would think about a re-education process for staff and businesses you deal with on what to look out for and what to double check directly before agreeing to. The aim is to have a closed loop that staff must follow.<\/p>","upvoteCount":3,"datePublished":"2019-09-05T22:10:12.000Z","url":"https://community.spiceworks.com/t/ms-outlook-email-hacked-spoofed/728837/3","author":{"@type":"Person","name":"ajb2000","url":"https://community.spiceworks.com/u/ajb2000"}},{"@type":"Answer","text":"
Step up user training. These things are almost always a result of a user falling for a phishing scam and freely giving away their credentials.<\/p>\n
MFA is going to stop this crap as far as O365 services go but you need to consider what other online services/banks/vendors/whatever your users may use the same credentials on as they probably will give 'em up again.<\/p>","upvoteCount":4,"datePublished":"2019-09-05T22:27:53.000Z","url":"https://community.spiceworks.com/t/ms-outlook-email-hacked-spoofed/728837/4","author":{"@type":"Person","name":"da-schmoo","url":"https://community.spiceworks.com/u/da-schmoo"}},{"@type":"Answer","text":"
Great, thanks everyone. Quick question about MFA, since when the user signs in it asks them what phone number they want to receive the MFA security code on, what’s to stop a hacker from using their own phone number? Is there a way that as the admin I can set their security contact method instead of them being prompted for it?<\/p>\n
Also, whats the best security suite add-on that you would recommend, just to be sure.<\/p>","upvoteCount":0,"datePublished":"2019-09-05T23:14:32.000Z","url":"https://community.spiceworks.com/t/ms-outlook-email-hacked-spoofed/728837/5","author":{"@type":"Person","name":"spiceuser-bfckz","url":"https://community.spiceworks.com/u/spiceuser-bfckz"}},{"@type":"Answer","text":"