Waiting to hear
I'm waiting to hear if MS knows what accounts have been abused and email sent to and are NOTIFYING people.
Or just being MS and letting their customers/victims find out for themselves the hard way.
The number of senior business executives stymied by an ongoing phishing campaign continues to rise with cybercriminals registering hundreds of cloud account takeovers (ATOs) since spinning it up in November. Researchers from Proofpoint listed many C-suite roles as prime targets for the unnamed attackers, as well as other …
It's the phishing gang that hangs out on a certain crime-friendly site with the initials "C.F." It's high quality phishing that buys clever domain names and has good site cloning. The gang has been refining their techniques on CF, AWS, and Google for years.
I emailed Microsoft security a few times in November when phishing and attacks were suddenly flooding in from Microsoft business accounts. Nothing happened so I blocked Microsoft on my personal server. That fixed it for me.
I checked my server logs now and it looks like Microsoft is mostly, but not entirely, cleaned up.
(CF because The Reg sometimes deletes posts with the full name.)
Because those Princesses demand that they have full admin rights, have unrestricted internet access and are allowed to install any software they want, because "Well don't you know who I am"
Combined with the "P4ssw0rd1" syndrome, because anything else is to difficult to remember when the PA isn't about and there you go.