{"id":90765,"date":"2020-03-20T08:00:54","date_gmt":"2020-03-20T15:00:54","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90765"},"modified":"2025-06-26T22:40:05","modified_gmt":"2025-06-27T05:40:05","slug":"protecting-against-coronavirus-themed-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/","title":{"rendered":"Protecting against coronavirus themed phishing attacks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The world has changed in unprecedented ways in the last several weeks due to the coronavirus pandemic. While it has brought out the best in humanity in many ways, as with any crisis it can also attract the worst in some. Cybercriminals use people\u2019s fear and need for information in phishing attacks to steal sensitive information or spread malware for profit. Even as some criminal groups claim they\u2019ll <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gangs-to-stop-attacking-health-orgs-during-pandemic\/\" target=\"_blank\" rel=\"noopener noreferrer\">stop attacking healthcare and nursing homes<\/a>, the reality is they can\u2019t fully control how malware spreads.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While phishing and other email attacks are indeed happening, the volume of malicious emails mentioning the coronavirus is very small. Still, customers are asking us what Microsoft is doing to help protect them from these types of attacks, and what they can do to better protect themselves. We thought this would be a useful time to recap how our automated detection and signal-sharing works to protect customers (with a specific recent example) as well as share some best practices you can use personally to stay safe from phishing attempts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-microsoft-is-doing\">What Microsoft is doing<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">First, 91 percent of all cyberattacks start with email. That\u2019s why the first line of defense is doing everything we can to block malicious emails from reaching you in the first place. A multi-layered defense system that includes machine learning, detonation, and signal-sharing is key in our ability to quickly find and shut down email attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If any of these mechanisms detect a malicious email, URL, or attachment, the message is blocked and does not make its way to your inbox. All attachments and links are detonated (opened in isolated virtual machines). Machine learning, anomaly analyzers, and heuristics are used to detect malicious behavior. Human security analysts continuously evaluate user-submitted reports of suspicious mail to provide additional insights and train machine learning models.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once a file or URL is identified as malicious, the information is shared with other services such as Microsoft Defender Advanced Threat Protection (ATP) to ensure endpoint detection benefits from email detection, and vice versa.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">An interesting example of this in action occurred earlier this month, when an attacker launched a spear-phishing campaign that lasted less than 30 minutes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Attackers crafted an email designed to look like a legitimate supply chain risk report for food coloring additives with an update based on disruptions due to coronavirus. The attachment, however, was malicious and delivered a sophisticated, multi-layer payload based on the Lokibot trojan (Trojan:Win32\/Lokibot.GJ!MTB).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Coronavirus-1.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"1101\" height=\"756\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Coronavirus-1.png\" alt=\"Screenshot of a phishing email about a coronavirus update.\" class=\"wp-image-90769\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-1.png 1101w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-1-300x206.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-1-1024x703.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-1-768x527.png 768w\" sizes=\"auto, (max-width: 1101px) 100vw, 1101px\" \/><\/a><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Had this payload been successfully deployed, hackers could have used it to steal credentials for other systems\u2014in this case FTP accounts and passwords\u2014which could then be used for further attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Only 135 customer tenants were targeted, with a spray of 2,047 malicious messages, but no customers were impacted by the attack. The Office 365 ATP detonation service, signal-sharing across services, and human analysts worked together to stop it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">And thanks to signal sharing across services, customers not using a Microsoft email service like Office 365, hosted Exchange, or Outlook.com, but using a Windows PC with Microsoft Defender enabled, were fully protected. When a user attempted to open the malicious attachment from their non-Microsoft email service, Microsoft Defender kicked in, querying its cloud-based machine learning models and found that the attachment was blocked based on a previous Office 365 ATP cloud detection. The attachment was prevented from executing on the PC and the customer was protected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-you-can-do\">What you can do<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">While bad actors are attempting to capitalize on the COVID-19 crisis, they are using the same tactics they always do. You should be especially vigilant now to take steps to protect yourself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Make sure your devices have the latest security updates installed and an antivirus or anti-malware service. For Windows 10 devices, Microsoft Defender Antivirus is a free built-in service enabled through Settings. Turn on cloud-delivered protection and automatic sample submission to enable artificial intelligence (AI) and machine learning to quickly identify and stop new and unknown threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Enable the protection features of your email service. If you have Office 365, you can learn about Exchange Online Protection <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/servicedescriptions\/exchange-online-protection-service-description\/exchange-online-protection-service-description\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> and Office 365 ATP <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/servicedescriptions\/office-365-advanced-threat-protection-service-description\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Use multi-factor authentication (MFA) on all your accounts. Most online services now provide a way to use your mobile device or other methods to protect your accounts in this way. Here\u2019s information on how to use <a href=\"https:\/\/www.microsoft.com\/en-us\/account\/authenticator\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Authenticator<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\/mfa\" target=\"_blank\" rel=\"noopener noreferrer\">other guidance on this approach<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">MFA support is available as part of the Azure Active Directory (Azure AD) Free offering. Learn more <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Educate yourself, friends, and colleagues on how to recognize phishing attempts and report suspected encounters. Here are some of the tell-tale signs.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Spelling and bad grammar<\/strong>. Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have an editorial staff to ensure customers get high-quality, professional content. If an email message is fraught with errors, it is likely to be a scam.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Suspicious links<\/strong>. If you suspect that an email message is a scam, do not click on any links. One method of testing the legitimacy of a link is to rest your mouse\u2014but not click\u2014over the link to see if the address matches what was typed in the message. In the following example, resting the mouse on the link reveals the real web address in the box with the yellow background. Note that the string of IP address numbers looks nothing like the company&#8217;s web address.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Coronavirus-2.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"67\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Coronavirus-2.png\" alt=\"Image 1\" class=\"wp-image-90770\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-2.png 350w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-2-300x57.png 300w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Suspicious attachments<\/strong>. If you receive an email with an attachment from someone you don\u2019t know, or an email from someone you do know but with an attachment you weren\u2019t expecting, it may be a phishing attempt, so we recommend you do not open any attachments until you have verified their authenticity. Attackers use multiple techniques to try and trick recipients into trusting that an attached file is legitimate.\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Do not trust the icon of the attachment.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Be wary of multiple file extensions, such as &#8220;pdf.exe&#8221; or &#8220;rar.exe&#8221; or &#8220;txt.hta&#8221;.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">If in doubt, contact the person who sent you the message and ask them to confirm that the email and attachment are legitimate.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Threats<\/strong>. These types of emails cause a sense of panic or pressure to get you to respond quickly. For example, it may include a statement like \u201cYou must respond by end of day.\u201d Or saying that you might face financial penalties if you don\u2019t respond.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Spoofing<\/strong>. Spoofing emails appear to be connected to legitimate websites or companies but take you to phony scam sites or display legitimate-looking pop-up windows.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Altered web addresses<\/strong>. A form of spoofing where web addresses that closely resemble the names of well-known companies, but are slightly altered; for example, &#8220;www.micorsoft.com&#8221; or &#8220;www.mircosoft.com&#8221;.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Incorrect salutation of your name<\/strong>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Mismatches<\/strong>. The link text and the URL are different from one another; or the sender\u2019s name, signature, and URL are different.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">If you think you\u2019ve received a phishing email or followed a link in an email that has taken you to a suspicious website, there are few ways to report what you\u2019ve found.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you think the mail you\u2019ve received is suspicious:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Outlook.com<\/strong>. If you receive a suspicious email message that asks for personal information, select the checkbox next to the message in your Outlook inbox. Select the arrow next to <strong>Junk<\/strong>, and then point to\u00a0<strong>Phishing scam<\/strong>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Microsoft Office Outlook 2016 and 2019 and Microsoft Office 365<\/strong>. While in the suspicious message, select\u00a0<strong>Report message<\/strong>\u00a0in the\u00a0<strong>Protection<\/strong>\u00a0tab on the ribbon, and then select\u00a0<strong>Phishing<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">If you\u2019re on a suspicious website:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Microsoft Edge<\/strong>. While you\u2019re on a suspicious site, select the\u00a0<strong>More<\/strong>\u00a0<strong>(\u2026)<\/strong>\u00a0icon >\u00a0<strong>Send feedback<\/strong>\u00a0>\u00a0<strong>Report Unsafe site<\/strong>. Follow the instructions on the web page that displays to report the website.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Internet Explorer<\/strong>. While you\u2019re on a suspicious site, select the gear icon, point to\u00a0<strong>Safety<\/strong>, and then select\u00a0<strong>Report Unsafe Website<\/strong>. Follow the instructions on the web page that displays to report the website.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">If you think you have a suspicious file:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/filesubmission\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Submit<\/strong><\/a> the file for analysis.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">If you are using Office 365:\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Admins can use the <strong>Submissions portal<\/strong> in the <strong>Office 365 Security &amp; Compliance Center<\/strong> to submit email messages, URLs, and attachments to Microsoft for scanning if they were received in one of their user\u2019s Exchange Online mailboxes. More details can be found <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/admin-submission?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">This is just one area where our security teams at Microsoft are working to protect customers and we\u2019ll share more in the coming weeks. For additional information and best practices for staying safe and productive through remote work, community support and education during these challenging times, visit <a href=\"https:\/\/news.microsoft.com\/covid-19-response\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s COVID-19 resources page<\/a> for the latest information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought now would be a good time to share some best practices and useful information.<\/p>\n","protected":false},"author":96,"featured_media":90767,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3898],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3695],"topic":[3682],"coauthors":[1949],"class_list":["post-90765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-elevation-of-privilege","content-type-news","product-microsoft-defender","product-microsoft-defender-for-office-365","topic-secure-remote-work","review-flag-1694638272-264","review-flag-1694638265-576","review-flag-1694638265-310","review-flag-2-1694638266-864","review-flag-alway-1694638263-571","review-flag-artif-1694638272-22","review-flag-machi-1694638272-641","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting against coronavirus themed phishing attacks<\/title>\n<meta name=\"description\" content=\"Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought this a useful time to share some best practices and information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting against coronavirus themed phishing attacks\" \/>\n<meta property=\"og:description\" content=\"Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought this a useful time to share some best practices and information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-20T15:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T05:40:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tanmay Ganacharya\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tanmay Ganacharya\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/tanmay-ganacharya\/\",\"@type\":\"Person\",\"@name\":\"Tanmay Ganacharya\"}],\"headline\":\"Protecting against coronavirus themed phishing attacks\",\"datePublished\":\"2020-03-20T15:00:54+00:00\",\"dateModified\":\"2025-06-27T05:40:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\"},\"wordCount\":1443,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png\",\"keywords\":[\"Elevation of privilege\"],\"articleSection\":[\"Microsoft Defender Advanced Threat Protection\",\"Office 365 Security\",\"Phishing\",\"Secure remote work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\",\"name\":\"Protecting against coronavirus themed phishing attacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png\",\"datePublished\":\"2020-03-20T15:00:54+00:00\",\"dateModified\":\"2025-06-27T05:40:05+00:00\",\"description\":\"Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought this a useful time to share some best practices and information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png\",\"width\":1200,\"height\":630,\"caption\":\"Image of a man working at his desktop PC.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting against coronavirus themed phishing attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d\",\"name\":\"Teri Seals-Dormer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"caption\":\"Teri Seals-Dormer\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting against coronavirus themed phishing attacks","description":"Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought this a useful time to share some best practices and information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Protecting against coronavirus themed phishing attacks","og_description":"Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought this a useful time to share some best practices and information.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-03-20T15:00:54+00:00","article_modified_time":"2025-06-27T05:40:05+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png","type":"image\/png"}],"author":"Tanmay Ganacharya","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png","twitter_misc":{"Written by":"Tanmay Ganacharya","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/tanmay-ganacharya\/","@type":"Person","@name":"Tanmay Ganacharya"}],"headline":"Protecting against coronavirus themed phishing attacks","datePublished":"2020-03-20T15:00:54+00:00","dateModified":"2025-06-27T05:40:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/"},"wordCount":1443,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png","keywords":["Elevation of privilege"],"articleSection":["Microsoft Defender Advanced Threat Protection","Office 365 Security","Phishing","Secure remote work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/","name":"Protecting against coronavirus themed phishing attacks","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png","datePublished":"2020-03-20T15:00:54+00:00","dateModified":"2025-06-27T05:40:05+00:00","description":"Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought this a useful time to share some best practices and information.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Coronavirus-BANNER-1.png","width":1200,"height":630,"caption":"Image of a man working at his desktop PC."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting against coronavirus themed phishing attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d","name":"Teri Seals-Dormer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14","url":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","caption":"Teri Seals-Dormer"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90765"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90765\/revisions"}],"predecessor-version":[{"id":140577,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90765\/revisions\/140577"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90767"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90765"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=90765"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90765"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90765"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=90765"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=90765"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90765"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}