Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Navigating blockchain adoption amid rising security challenges
Scattered Spider: still spinning phishing webs on corporate land?
TaiPei-based Hong Tong Technology Acquires Initio’s Entire Encry...
Do not let hackers halt your plant: Checklists for reviewing OT cyber ...
Scammers are now hooking low-hanging bait with crypto malvertising
LOGIN REGISTER
CybersecAsia
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning

Select Page

News

New phishing scam targets US workers on a widely used CRM platform

By CybersecAsia editors | Sunday, May 11, 2025, 11:07 AM Asia/Singapore

New phishing scam targets US workers on a widely used CRM platform

As many of the US organizations targeted are also multinational corporations, some 500,000 workers worldwide could have been compromised.

A sophisticated phishing campaign has emerged, targeting employees across various US organizations with fraudulent emails.

Over 3,370 emails have reached more than 350 organizations, primarily in the US, affecting over a million mailboxes.

Victims have included community groups, universities, news outlets, health information organizations, and arts and culture entities, highlighting the broad reach of this cyber threat.

Modus operandi
Working along the lines of past phishing campaigns, the scheme works by exploiting a commonly used platform for its victim base: in this case, a customer relationship management tool used by approximately 500,000 organizations globally — Microsoft’s Dynamics 365 Customer Voice:

  • They send emails from compromised accounts, embedding fake links disguised as legitimate business communications, such as invoices or settlement statements.
  • The emails often claim to provide access to voicemails or PDF documents. To enhance credibility, the links direct users to a Captcha test, misleading them into believing the request is authentic. The emails typically focus on financial themes, using subject lines related to payments or closing disclosures to lure recipients. In some cases, attackers embed legitimate links alongside fake ones to further deceive users.
  • Victims are then redirected to a counterfeit Microsoft login page designed to steal credentials. The attackers’ goal is to gain unauthorized access to sensitive systems, potentially leading to account manipulation, fund theft, or operational disruptions.

While Microsoft has blocked some of the phishing pages, some emails had likely reached inboxes before mitigation efforts were implemented.

The campaign was uncovered by Check Point. A researcher from their team had noted: “This campaign demonstrates the evolving tactics of cybercriminals, leveraging trusted platforms to deceive users.”

The firm is reminding organizations to educate employees about verifying email origins, particularly those claiming to be from big-brand services, and to adopt advanced email security measures. With AI being exploited by cybercriminals to outwit traditional cybersecurity solutions, workers also need to be kept apprised of the latest tactics and vigilance mindset needed to avoid becoming victims.

Share:

PreviousWeb attacks surge 73% from 2023 to 2024 in the Asia Pacific-Japan region: report  
NextCyber readiness survey finds flat progress among respondents from 2023 to 2024

Related Posts

Cloud-native apps: fast to deploy, fast to be exploited by malware

Cloud-native apps: fast to deploy, fast to be exploited by malware

Tuesday, May 21, 2024

Keep software supply chain attacks at bay with more automation, greater visibility

Keep software supply chain attacks at bay with more automation, greater visibility

Monday, November 14, 2022

When cybersecurity professionals exchange threat intelligence selectively

When cybersecurity professionals exchange threat intelligence selectively

Thursday, March 11, 2021

When you want cheese not to slide off your hot pizza, what do you do?

When you want cheese not to slide off your hot pizza, what do you do?

Tuesday, June 4, 2024

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.