A massive Microsoft 365 phishing campaign has been uncovered, with attackers using fake login pages to harvest usernames and passwords. The platform, called Quantum Route Redirect (QRR), uses nearly 1,000 domains, many of which are parked or compromised legitimate sites, making the pages look convincing.
The kit sends realistic email lures that mimic DocuSign requests, payment notices, voicemail alerts, or QR-code prompts, routing victims to a fake Microsoft 365 login page. Attackers can manage campaigns inside a control panel that logs traffic and activity, allowing them to scale up quickly without technical skill.
Security researchers have tracked QRR in 90 countries, with about 76% of attacks hitting US users, making it one of the largest phishing operations active right now. The attack uses automation, bot filtering, and a dashboard to help attackers run large campaigns fast.
To stay safe from QRR and other Microsoft 365 phishing attacks, experts recommend the following steps: check the sender before clicking on any link, hover over links first to preview the URL, turn on multifactor authentication (MFA), use a data removal service, update your browser and apps, never click unknown links, use strong antivirus software, watch for login alerts, and stay aware of the latest tricks.
By following these smart habits, you can put yourself a step ahead of attackers. The good news is that with stronger sign-in protection, turning on alerts, and staying informed, it becomes much harder for criminals to sneak in.
The kit sends realistic email lures that mimic DocuSign requests, payment notices, voicemail alerts, or QR-code prompts, routing victims to a fake Microsoft 365 login page. Attackers can manage campaigns inside a control panel that logs traffic and activity, allowing them to scale up quickly without technical skill.
Security researchers have tracked QRR in 90 countries, with about 76% of attacks hitting US users, making it one of the largest phishing operations active right now. The attack uses automation, bot filtering, and a dashboard to help attackers run large campaigns fast.
To stay safe from QRR and other Microsoft 365 phishing attacks, experts recommend the following steps: check the sender before clicking on any link, hover over links first to preview the URL, turn on multifactor authentication (MFA), use a data removal service, update your browser and apps, never click unknown links, use strong antivirus software, watch for login alerts, and stay aware of the latest tricks.
By following these smart habits, you can put yourself a step ahead of attackers. The good news is that with stronger sign-in protection, turning on alerts, and staying informed, it becomes much harder for criminals to sneak in.