Multicloud MSP company Rackspace has issued a customer alert warning about the higher likelihood of phishing attacks exploiting the ransomware attack that impacted the firm's hosted Microsoft Exchange environment, reports BleepingComputer.
Rackspace customers have been advised to be wary of emails sent from spoofed email addresses that redirect to phishing pages, as well as messages seeking login credentials or personal details, which would not be asked by official Rackspace support.
Rackspace also urged customers to be mindful of potential suspicious activity in their banking statements and credit reports despite the lack of evidence suggesting any data theft from the attack.
No updates regarding the attackers' identity or the data they could have accessed or exfiltrated were provided by Rackspace although the company noted that it is already in the early phases of identifying any affected data, if any.
Rackspace said that the incident is poised to result in a loss of revenue for the company.
Sixty thousand emails from U.S. State Department accounts were noted by a staffer working for Sen. Eric Schmitt, R-Mo., to have been exfiltrated by Chinese threat actors during the widespread compromise of Microsoft email accounts that commenced in May, according to Reuters.
Threat actors have leveraged the ZeroFont phishing attack technique, which initially involved the insertion of hidden characters or words in emails to evade security detection systems, to modify message previews as shown on Microsoft Outlook and other email clients, BleepingComputer reports.
BleepingComputer reports that individuals who have filed claims against bankrupt cryptocurrency lender Celsius have been subjected to phishing attacks involving the impersonation of the lender's claims agent, Stretto.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news