Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials

New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials

Posted on October 17, 2025October 17, 2025 By CWS

A brand new marketing campaign has emerged that weaponizes Microsoft’s acquainted branding to lure unsuspecting customers into a classy tech assist rip-off.

Victims obtain a seemingly reputable e-mail, full with Microsoft’s official emblem, claiming there is a crucial monetary transaction or safety alert requiring rapid consideration.

The message prompts recipients to click on a hyperlink below the guise of confirming identification or resolving an pressing subject.

Cofense analysts famous that the risk actors have refined their social engineering techniques by combining fee lures with misleading UI overlays to maximise influence.

Upon clicking the hyperlink, customers are redirected by a pretend CAPTCHA problem designed to imitate a trusted verification course of.

Redirect Web page (Supply -Cofense)

When the sufferer completes the verification, they’re led to a touchdown web page the place the browser seems locked by a number of pop-up home windows styled after real Microsoft safety alerts.

E mail Physique (Supply -Cofense)

The attacker’s objective is to create a way of panic, convincing the person that their system has been compromised past regular performance.

In lots of instances, the rip-off culminates in a displayed assist cellphone quantity claiming to be Microsoft’s helpline.

When the sufferer dials, they connect with a malicious actor posing as a assist technician.

Beneath the pretext of resolving the an infection, the scammer persuades the goal to reveal their Microsoft account credentials or set up a distant desktop device to “restore” the system, thereby granting full entry to the attacker’s infrastructure.

An infection Mechanism

The an infection begins with a listing of noticed URLs that function redirectors and payload hosts. The preliminary redirector domains embrace:

hxxps://alphadogprinting.com/index.php?8jl9lz
hxxps://amormc.com/index.php?ndv5f1

These URLs funnel victims by a CAPTCHA web page earlier than touchdown on the malicious overlay server. The payload domains, comparable to:

hxxps://my.toruftuiov.com/9397b37a-50c4-48c0-899d-f5e87a24088d
hxxps://deprivy.stified.sbs/proc.php

host the scripted overlays that manipulate the DOM to disable mouse management and show counterfeit alerts.

The browser lock is solely illusory and will be dismissed by urgent the ESC key, however few victims uncover this earlier than contacting the attacker.

By mixing trusted logos with a number of redirect phases and UI deception, this marketing campaign exemplifies an evolving risk that leverages model familiarity to facilitate credential theft.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Credentials, Login, Logo, Microsofts, Scam, Steal, Support, Tech, Tricks, Users

Post navigation

Previous Post: Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error
Next Post: North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

Related Posts

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server Cyber Security News
Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Cyber Security News
M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Cyber Security News
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark