top of page

Beware of Cloud Storage Phishing Scam Emails






In today's digital landscape, phishing attacks are becoming increasingly sophisticated. Cellopoint Threat Insights is dedicated to keeping you informed about the latest trends in phishing, ransomware, and BEC attacks. This article highlights a phishing email that spoofs a OneDrive file-sharing notification and offers insights into how you can protect yourself.  


Based on Cellopoint’s global threat intelligence data, In 2023, Microsoft's brands and products were among the most impersonated by cybercriminals, leveraging users' trust in these well-known names to execute their attacks. OneDrive, a popular Microsoft cloud storage service, has become a prime target. 

 

Case Analysis:  

 

Here’s an example of a phishing email intercepted by Cellopoint, masquerading as a OneDrive file-sharing notification:



The email contains a button that appears to link to a legitimate OneDrive page but actually directs users to a phishing site:“https://gdp.tbadigital[.]com[.]br/vendor/zrp/app/?client-request-id=tom.lee@cellopoint.com.” This page is pre-filled with the user's email address to trick them into entering their password. 



If users fall victim to this, their login credentials could be compromised, leading to potential data breaches or malware infections. Vigilance is crucial to safeguard against such threats.  

 

Threat Detection

 

Cellopoint’s inbound email security solution features an advanced Anti-spam module that identifies phishing patterns and conducts comprehensive risk assessments. The phishing email mentioned was flagged as high-risk and intercepted by our Anti-spam module due to its unfamiliar sender and malicious URLs. 


Threat Prevention 

 

Cellopoint’s multi-layered inbound email protection solution offers robust and flexible security, whether deployed in the cloud or on-premises. Cellopoint solution integrates advanced detection engines, machine learning technologies, and a powerful threat intelligence network to identify and block email threats effectively. 


Cellopoint five layers of inbound protection include Anti-spam, Anti-virus, Anti-APT-URL, Anti-APT-File, and Anti-BEC. Enhanced by AI and real-time threat intelligence, these layers perform pattern detection, virus scanning, threat assessment, semantic analysis, user behavior modeling, and reputation checks. This proactive approach blocks advanced threats such as phishing, spear phishing, brand impersonation, BEC scams, and zero-day attacks. 


Protect your organization with Cellopoint’s comprehensive email security solution and stay ahead of evolving threats.

bottom of page