The latest phishing campaign uses a Coinbase-themed email in order to allow hackers access a user’s email account and perform actions on their behalf.

  • A recent phishing campaign uses a Coinbase-themed email to get access to a user’s email account.Coinbase is supposed to be secure, yet you need to pay attention to the New terms of service email.In order to enjoy access to premium productivity and collaboration apps, find all about Microsoft 365.Moreover, feel free to bookmark our Security & Privacy Software Hub to find more security tricks.

  • Download Restoro PC Repair Tool that comes with Patented Technologies (patent available here).

  • Click Start Scan to find Windows issues that could be causing PC problems.

  • Click Repair All to fix issues affecting your computer’s security and performance

  • Restoro has been downloaded by 0 readers this month.

That’s possible by using a specific Microsoft 365 consent app that gives attackers access to the user’s email. These consent apps actually are Microsoft 365 OAuth applications.

At the moment, this phishing campaign takes the form of a New terms of service agreement that Coinbase users must read and accept in order to continue using the service.

Things like that have constantly happened during the past few years. Here’s what one user said:

How to protect Microsoft 365 account from Coinbase phishing?

Recently received an authorization email from “coinbase” claiming that a new device is requesting access to your account. The email said the IP location was from Russia, so I scrolled down and hit “cancel request”.

You are asked to log in to the Microsoft account. Pay attention to the URL and see if it asks for the User.Read, Mail.Read, and Mail.ReadWrite permissions.

Once in your Microsoft account, you’ll see a new prompt to allow an app from coinbaseterms.app to access your account.

At this point, do not accept the app’s request or else you risk turning into a victim of a fraudulent practice that may a huge impact on your security.

The security token associated with your account will fall into the wrong hands and will get compromised in no time.

Hackers will be able to access your mail, contacts, personal notes, and any sensitive information stored on your cloud storage space.

Let us know if this has ever happened to you in the past, by using the comments area below.

If the advices above haven’t solved your issue, your PC may experience deeper Windows problems. We recommend downloading this PC Repair tool (rated Great on TrustPilot.com) to easily address them. After installation, simply click the Start Scan button and then press on Repair All.

Still having issues? Fix them with this tool:

SPONSORED

  • Microsoft 365Phishing

Email *

Commenting as . Not you?

Comment