Friday, March 24, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Queen Elizabeth II’s death is used in phishing attacks

Queen Elizabeth II’s death is used in phishing attacks

It has been reported that some hackers are taking advantage of the death of Queen Elizabeth II to perform phishing attacks aiming to steal the Microsoft credentials.


Hanife Diktas Hanife Diktas
September 15, 2022
2 min read
Queen Elizabeth II's death is used in phishing attacks
  • A phishing campaign is exploiting the death of Queen Elizabeth II to steal Microsoft account credentials from victims.
  • The victims sent a message claiming that Microsoft is launching an interactive AI memory board in honor of Queen Elizabeth II.
  • The National Cyber Security of the United Kingdom has warned people to be cautious about emails, messages, or any other communication tools concerning the funeral of Queen Elizabeth II.

The National Cyber Security of the United Kingdom warned about possible phishing activities and scams during the period of national mourning for Queen Elizabeth II. The hackers have lured victims to sites that steal their Microsoft account credentials.

“In memory of her majesty”

It seems that the hackers did not miss the opportunity of Queen Elizabeth II’s death as happens regularly with any event that has an impact globally for a phishing campaign. According to Proofpoint’s Threat Insight team, the hackers have been sending e-mails to people by impersonating Microsoft. The victims are invited to a site that looks like an “artificial technology hub” in the Queen’s honor.

Proofpoint identified a credential #phish campaign using lures related to Her Majesty Queen Elizabeth II. Messages purported to be from Microsoft and invited recipients to an “artificial technology hub” in her honor. pic.twitter.com/RCcqpgfFfX

— Threat Insight (@threatinsight) September 14, 2022

The message claims that Microsoft is launching an interactive AI memory board in honor of Her Majesty Queen Elizabeth II and invites the recipients to contribute to its creation by accessing it using their Microsoft account credentials. The message included links to a URL that redirected to a credential harvesting page. The page asks for Microsoft email credentials containing the MFA collection. The actor used the EvilProxy phish kit. EvilProxy is a man-in-the-middle phishing framework that offers an easy-to-use GUI where threat actors can set up and manage phishing campaigns.

The National Cyber Security of the United Kingdom has stated that they do not have extensive evidence of such campaigns yet. However, it warned about emails, text messages, and other communications related to the death of the Queen and arrangements for her funeral should be approached cautiously.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Hanife Diktas

Hanife Diktas

Hanife Diktas is a news editor at Cloud7 News. Hanife started her career in the manufacturing sector in the marketing and sales department. Hanife worked in industrial equipment, renewable energy, and technology sectors. Hanife Diktas did her bachelor's degree in business administration and completed a master's degree in management at Yeditepe University in Istanbul, Turkey. Hanife is a Linux user, and she also contributed to AlmaLinux OS at the beginning of the project. Hanife focuses on web hosting, cloud computing, data centers, cybersecurity, Linux OS, and virtualization technologies. Hanife enjoys creating content and shooting videos covering these topics.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Oracle launches a cloud region in Spain

Oracle launches a cloud region in Spain

Related News

CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
7 biggest data breaches in the history of the internet

7 biggest data breaches in the history of the internet

March 16, 2023 10:55 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Photopea review: The best free Photoshop alternative for Linux
  • CloudFest 2023 is completed
  • EdgeConneX executes $3.3B in sustainability-linked financing
  • How to manage DNS settings in Linux
  • What is Cloudflare Warp?

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.