Our Attacker Behavior Analytics (ABA) monitoring has identified an active phishing campaign impersonating Microsoft 365 Quarantine notifications. The attackers’ goal is simple: steal user credentials by directing recipients to a fake Microsoft login page.
These emails look convincing, carry urgent language, and mimic real Microsoft formatting. Here’s what to watch for and what to do if one lands in your inbox.
Attackers are sending messages that:
These emails are engineered to look routine which is why they work.
Legitimate Microsoft quarantine notifications:
If anything looks off, stop. Hover over links and confirm the sender before taking action.
If a suspicious email hits your inbox:
Reporting helps your organization stop the attack from spreading.
Take action immediately:
Fast reporting limits the impact and reduces the attacker’s window of opportunity.
Through ABA monitoring, ISI is:
Early detection allowed us to alert clients quickly and help reduce the risk of credential theft.
Attackers rely on:
Because many contractors use Microsoft 365 for business-critical communication, including workflows involving sensitive data, credential theft remains a high-value target for attackers.
A few steps can significantly reduce risk:
Awareness plus strong controls dramatically limit attacker success.
Phishing campaigns evolve quickly. ISI will continue monitoring this activity and share updates if tactics change or new variants emerge.
Your vigilance protects both your organization and the broader Defense Industrial Base.
-ISI Cybersecurity Team