<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic O365, AD Conditional Access, Phishing with fake sign in in Managing Users</title>
    <link>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883007#M940</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Was alarmed to read the following, which describes a fake o365 login page whereby the user puts in their credentials on the fake page.&lt;/P&gt;
&lt;ASIDE class="onebox allowlistedgeneric" data-onebox-src="https://www.computerweekly.com/news/252506088/Experts-warn-on-Office-365-phishing-attacks"&gt;
  &lt;HEADER class="source"&gt;
      &lt;IMG src="https://www.computerweekly.com/favicon.ico" class="site-icon" width="16" height="16" /&gt;

      &lt;A href="https://www.computerweekly.com/news/252506088/Experts-warn-on-Office-365-phishing-attacks" target="_blank" rel="noopener nofollow ugc"&gt;ComputerWeekly.com&lt;/A&gt;
  &lt;/HEADER&gt;

  &lt;ARTICLE class="onebox-body"&gt;
    &lt;DIV class="aspect-image" style="--aspect-ratio:690/229;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="2X_6_648cd956344c20b4573114acafcba6d29242e019.jpeg" style="width: 690px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191336i34285CC4C0B95F1F/image-size/large?v=v2&amp;amp;px=999" role="button" title="2X_6_648cd956344c20b4573114acafcba6d29242e019.jpeg" alt="2X_6_648cd956344c20b4573114acafcba6d29242e019.jpeg" /&gt;&lt;/span&gt;&lt;/DIV&gt;

&lt;H3&gt;&lt;A href="https://www.computerweekly.com/news/252506088/Experts-warn-on-Office-365-phishing-attacks" target="_blank" rel="noopener nofollow ugc"&gt;Experts warn on Office 365 phishing attacks&lt;/A&gt;&lt;/H3&gt;

  &lt;P&gt;Newly observed campaign is particularly dangerous because it appears to neutralise one of the most widely known anti-phishing techniques.&lt;/P&gt;


  &lt;/ARTICLE&gt;

  &lt;DIV class="onebox-metadata"&gt;
    
    
  &lt;/DIV&gt;

  &lt;DIV style="clear: both"&gt;&lt;/DIV&gt;
&lt;/ASIDE&gt;

&lt;P&gt;We are using AD conditional access for MFA with DUO for our Office 365 logins.  Since the o365 access is automatically redirected to the DUO login page,  is it possible that MFA could be bypassed and that the user credentials would be captured by the criminal in this case?&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 02 Sep 2021 15:58:56 GMT</pubDate>
    <dc:creator>lkeyes1</dc:creator>
    <dc:date>2021-09-02T15:58:56Z</dc:date>
    <item>
      <title>O365, AD Conditional Access, Phishing with fake sign in</title>
      <link>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883007#M940</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Was alarmed to read the following, which describes a fake o365 login page whereby the user puts in their credentials on the fake page.&lt;/P&gt;
&lt;ASIDE class="onebox allowlistedgeneric" data-onebox-src="https://www.computerweekly.com/news/252506088/Experts-warn-on-Office-365-phishing-attacks"&gt;
  &lt;HEADER class="source"&gt;
      &lt;IMG src="https://www.computerweekly.com/favicon.ico" class="site-icon" width="16" height="16" /&gt;

      &lt;A href="https://www.computerweekly.com/news/252506088/Experts-warn-on-Office-365-phishing-attacks" target="_blank" rel="noopener nofollow ugc"&gt;ComputerWeekly.com&lt;/A&gt;
  &lt;/HEADER&gt;

  &lt;ARTICLE class="onebox-body"&gt;
    &lt;DIV class="aspect-image" style="--aspect-ratio:690/229;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="2X_6_648cd956344c20b4573114acafcba6d29242e019.jpeg" style="width: 690px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191336i34285CC4C0B95F1F/image-size/large?v=v2&amp;amp;px=999" role="button" title="2X_6_648cd956344c20b4573114acafcba6d29242e019.jpeg" alt="2X_6_648cd956344c20b4573114acafcba6d29242e019.jpeg" /&gt;&lt;/span&gt;&lt;/DIV&gt;

&lt;H3&gt;&lt;A href="https://www.computerweekly.com/news/252506088/Experts-warn-on-Office-365-phishing-attacks" target="_blank" rel="noopener nofollow ugc"&gt;Experts warn on Office 365 phishing attacks&lt;/A&gt;&lt;/H3&gt;

  &lt;P&gt;Newly observed campaign is particularly dangerous because it appears to neutralise one of the most widely known anti-phishing techniques.&lt;/P&gt;


  &lt;/ARTICLE&gt;

  &lt;DIV class="onebox-metadata"&gt;
    
    
  &lt;/DIV&gt;

  &lt;DIV style="clear: both"&gt;&lt;/DIV&gt;
&lt;/ASIDE&gt;

&lt;P&gt;We are using AD conditional access for MFA with DUO for our Office 365 logins.  Since the o365 access is automatically redirected to the DUO login page,  is it possible that MFA could be bypassed and that the user credentials would be captured by the criminal in this case?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 02 Sep 2021 15:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883007#M940</guid>
      <dc:creator>lkeyes1</dc:creator>
      <dc:date>2021-09-02T15:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: O365, AD Conditional Access, Phishing with fake sign in</title>
      <link>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883008#M941</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;If you are using the Conditional Access method to protect Office 365 with Duo, then there is no Duo page redirect.  The process is user types in email, clicks next, is sent to the Microsoft password reception page which you can / may  have branded, and then when click submit it prompts the user for a Duo prompt.&lt;/P&gt;
&lt;P&gt;To the concerns raised in the article, yes, this attack is entirely still possible with MFA enabled.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 03 Sep 2021 14:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883008#M941</guid>
      <dc:creator>adam.palmer</dc:creator>
      <dc:date>2021-09-03T14:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: O365, AD Conditional Access, Phishing with fake sign in</title>
      <link>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883009#M942</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Hi, &lt;A class="mention" href="https://community.duo.com/u/adam.palmer"&gt;@adam.palmer&lt;/A&gt; :  With our conditional access…  you do indeed go to the Microsoft password reception page…  put in your name and password… however at that point the page goes to &lt;A href="http://xxxxxxxx.duosecurity.com" rel="noopener nofollow ugc"&gt;xxxxxxxx.duosecurity.com&lt;/A&gt;  which gives you the option of Send Me a Push, Call Me or Enter a Passcode. …  I’d call that a redirect… from the o365 login page to the duo page…   my question was whether that constituted a vulnerability… could some bad actor intercept that redirection,  put up a bogus DUO MFA page perhaps…&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 03 Sep 2021 15:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883009#M942</guid>
      <dc:creator>lkeyes1</dc:creator>
      <dc:date>2021-09-03T15:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: O365, AD Conditional Access, Phishing with fake sign in</title>
      <link>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883010#M943</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Duo integrations that support the new &lt;A href="https://duo.com/docs/universal-prompt-update-guide"&gt;Universal Prompt&lt;/A&gt; (like Duo’s custom control for Azure AD) protect against the scenario you describe (a bogus Duo MFA page) by using &lt;A href="https://duo.com/docs/oauthapi"&gt;OIDC standards-based authorization&lt;/A&gt;, signed by the unique application info, with a redirect to a page hosted in our own domain. Even if that redirect was intercepted and someone created a fake hosted Duo MFA prompt, it would not provide valid authorization for the auth success.&lt;/P&gt;
&lt;P&gt;For applications not yet updated to the OIDC authorization flow, that still show Duo’s traditional prompt in an iframe on a page hosted at the application (not a redirect to a page hosted by Duo, we recommend configuring &lt;A href="https://duo.com/docs/protecting-applications#hostname-whitelisting"&gt;a list of hosts allowed to show the prompt&lt;/A&gt; in the Duo application’s properties to protect against this.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 07 Sep 2021 13:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/o365-ad-conditional-access-phishing-with-fake-sign-in/m-p/4883010#M943</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2021-09-07T13:01:25Z</dc:date>
    </item>
  </channel>
</rss>

