Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aka.ms/MFASetup reads like a phishing attack #31136

Closed
idontusenumbers opened this issue May 13, 2019 · 38 comments
Closed

aka.ms/MFASetup reads like a phishing attack #31136

idontusenumbers opened this issue May 13, 2019 · 38 comments

Comments

@idontusenumbers
Copy link

The aka.ms domain looks like a phishing attack that every enterprise has trained their employees not to click.


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

@SadiqhAhmed-MSFT
Copy link
Contributor

@idontusenumbers Thanks for the comment! We will investigate this issue and get back to you soon.

@MohitDhingra-MSFT
Copy link

@idontusenumbers Aka.ms is an internal Microsoft URL shortening service and not available publicly so there is no way that it can be identified even closely as a phishing attack URL . As per your statement it seems like this is just an assumption on your part but we assure you that the URL is completely safe and it is not at all associated from any phishing activity .

Hope this clarifies your doubts. Should you have any further query on this, feel free to tag me or the doc author @eross-msft to your reply and we will be happy to clarify anything as needed. We will close this issue now.

Thank you.

@idontusenumbers
Copy link
Author

@MohitDhingra-MSFT @eross-msft There is no evidence that suggests that aka.ms is internal or microsoft controlled without significant research. That's like chase bank saying "it's okay to enter your bank account credentials on cha.se because we control it". There's no way for even a tech-savvy user to verify it's a Microsoft domain because it immediately redirects to a different domain so the certificate can't be verified. Users are taught year after year to very specifically flag this sort of domain as a phishing domain and to report it to their IT department. In my (professional) opinion, this is an enormous security mistake and benefits no one. https://microsoft.com/mfasetup would be a 1000x better option.

@cthombor
Copy link

cthombor commented Dec 3, 2019

Indeed, I thought I was being spearphished very cleverly today, with a very plausible-looking invoice accompanied by an email that invited me to "View your Agreement(s) https://aka.ms/AA1wm3t." Yeah right, like I'm gonna follow a link to some dodgy-looking URL in the Monserrat domain! Thanks for posting the bona-fides here to github, clearly not a phishing attack ;-)

@PRMerger13 PRMerger13 added the Pri1 label Dec 3, 2019
@lordneeko
Copy link

I agree. Link Shortening services are VERY suspicious. In fact the DoD blocks all of them (except their own HA)...so all aka.ms links just fail for us. This is actually becoming commong for enterprises. The reason is we TRAIN users to look at URLs to be sure they are going where they think they are going. With Link Shorteners you can never be certain...no matter how "official" the link shorteener service is.

@400lbhacker
Copy link

@400lbhacker
Copy link

400lbhacker commented Dec 21, 2019

not all are secure, check this one: schemas.microsoft.com/SMI/2005/WindowsSettings"
im seeing lots of CDN akmai servers using legitimate content as logic bomb functionality in very advanced viruses, using time out keys that a virus author can control to stop campaigns by pulling them.. another weird feautre is viruses spying on microsoft users by activating familly control, and using microsoft accounts to see what their victims are looking at by getting reports... im seriously not even starting to trust microsoft because many of these viruses are generatign such heavy traffic, and google and microsoft are all getting interesting metadata from it..

many of the most active viruses im studying at the moment are all certificate signed, all microsoft whitelisted, all contacting google ad services or legitmiate microsoft / semi-legimtiate pages.... anotjher weird thing i have another virus that uses /embedding followed by number string as a CLI argument and in another of thsoe aka.ms websites in the url their is a urli context asking Embeded?y/N aka

https://login.microsoftonline.com/common/oauth2/authorize?response_type=id_token&client_id=45a330b1-b1ec-4cc1-9161-9f03992aa49f&scope=openid&msafed=0&nonce=a5dfc125-1fd6-407b-9202-0a5d19c20fe7&response_mode=form_post&redirect_uri=https://businessstore.microsoft.com/auth/&state=%7B%22encodedRedirectUri%22:%22L21hbmFnZS9vcmdhbml6YXRpb24vYWdyZWVtZW50cw==%22,%22isEmbedded%22:false%7D

@cthombor
Copy link

cthombor commented Jan 2, 2020

@cthombor
Copy link

cthombor commented Jan 2, 2020

But... I don't think it reasonable to expect anyone outside of MS to trust (or even know about) its control of aka.ms. So https://safecomputing.umich.edu/be-aware/phishing-and-suspicious-email/shortened-url-security is I think most relevant here...

@idontusenumbers
Copy link
Author

@MohitDhingra-MSFT @eross-msft Can we get a deeper analysis of the use of this shortened URL? From a user's point of view, there's no benefit to the shortened URL and enormous costs: inability to complete task because IT blocks URL shorteners or because it's perceived as a phishing attack and thus intentionally not clicked

@cthombor
Copy link

cthombor commented Jan 3, 2020

Hmmm... a good next step might be to look at some specific cases in which aka.ms is used, then classify as a use-case or a misuse-case. That's way out of my range of responsibility -- I'm just an end-user.

I'll now unsubscribe to this thread.... but as a parting gift I do have a case to offer: an email I received a month ago, with an aka.ms link. A flat-text version is appended. I have suppressed anything that's obviously-unhashed PII, and I'm ok with running the privacy-risk of posting this case to a public-viewable webarea.

  1. I can't be bothered to figure out how the aka.ms redirection pulls up my PII, but when I (finally!) dared to visit it a few minutes ago, my (Chrome) browser was redirected to https://login.microsoftonline.com/common/oauth2/authorize?response_type=id_token&client_id=AAAA&scope=openid&msafed=0&nonce=BBBB&response_mode=form_post&redirect_uri=https://businessstore.microsoft.com/auth/&state=%7B%22encodedRedirectUri%22:%22CCCC==%22,%22isEmbedded%22:false%7D&sso_reload=true. So: aka.ms redirection is apparently far more powerful than a tinyurl redirection. However: I think it unlikely that the target "AA1wm3t" of this aka.ms contains a hashed version of my PII because its only 8 chars long, and because the popup "Pick an account" window on this microsoftoneline.com visit isn't helping me navigate the portion of my personal-identity-hell that is directly administered by MS (i.e. I see four explicit options on the "Pick an account" list, plus the option to "Use another account".

  2. I suspect the png link is a tracker with a hashed reference to my account number, so I have anonymised it. It's an 115x27 png which would have displayed an MS graphic in my Outlook client, if I had ever allowed it to present this email to me in html. (BTW I run my Outlook in plaintext-only mode, as one of my lines of defense against email-nasties.)

Here's the anonymised case. Ignore if you like. I have already frittered away more than enough of my time on this issue!

Cheers,
Clark

--

From: Microsoft (do not reply) maccount@microsoft.com
Sent: Tuesday, 3 December 2019 6:12 PM
To: Undisclosed recipients:
Subject: Your Microsoft billing statement

http://compass.microsoft.com/assets/eb/68/WWW.png

Your Microsoft billing statement is ready

Organization: XXX

Domain: YYY.com

Your billing statement is ready for review and is attached to this email.

We email invoices by default, but you can change how you receive invoices https://portal.office.com/AdminPortal/Home?ref=BillingNotifications if you want.

Thank you,

The Microsoft Online Services Team

Microsoft respects your privacy. Review our online Privacy Statement https://privacy.microsoft.com/en-us/privacystatement .

Additional questions?

Please visit Customer Support https://businessstore.microsoft.com/en-us/support site.

View your Agreement(s) https://aka.ms/AA1wm3t .

Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
https://mucp.api.account.microsoft.com/m/v2/v?d=ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ

--

@cthombor
Copy link

cthombor commented Jan 3, 2020

Me again, with a second case of aka.ms usage.

This case features a friendly target of the aka.ms: the link displays in my (Acrobat Pro DC) PDF viewer as https://aka.ms/Office365Billing.

I'd very be surprised if there were a covert channel that allowed this particular aka.ms redirection to be pulling my PII from this particular pdf document, but that'd certainly be a possibility worth exploring if I were a malware designer or on contract as a security analyst!

(Case notes: I rendered the PDF attachment of my case #1 to png, then I cut out the displayed PII.)

Office 365_Page_1

@eross-msft
Copy link
Contributor

Thank you everyone for your insight into the URLs. We appreciate the provided data as it helps shape our decisions going forward.
We, as the content team, are actually moving away from using the aka.ms short URLs and instead using the full site URLs. With that being said, the product groups and other teams aren't necessarily changing their styles to reflect this update. Additionally, we don't have the bandwidth to go back and update all aka.ms links and can only update the links we see in articles that are being updated or in new articles.
For the purposes of the MFA article being referenced, I can go in and update this link to a full URL. But as you find additional links, you can go ahead and update them yourselves through GitHub and a GitHub account. We do go through and read/accept pull requests from both internal and external customers. If you need instructions about how to do this, you can find them here: https://docs.microsoft.com/en-us/contribute/.

@eross-msft
Copy link
Contributor

#please-close

@cpopolo
Copy link

cpopolo commented May 21, 2020

5 months later, you're still using this domain to encourage Windows 10 owners to link their phone with their desktop, so that "I never have to email pictures to myself ever again". So those pictures will be routed through a server in Montserrat? Thanks, but I figure I'll just download them via USB instead.

@kendrikat
Copy link

Is it safe now or what?

@kendrikat
Copy link

:)

@wsy
Copy link

wsy commented Sep 23, 2020

I agree.
For consumers, individual customers, aka.ms is good because it's easy to remember and there are no big security concerns.
For business customers, some of them even use an Internet firewall in allow-list mode, you really need to give them a good reason to accept this domain.
I think Microsoft should at least officially make an announcement, declaring something such as
"aka.ms is Microsoft-owned domain.",
"This domain is used by Microsoft in order to ..... and IT admins can safely put it into your company's firewall allow-list...",
"You may trust Microsoft URL beginning with aka.ms",
something like that.

@idontusenumbers
Copy link
Author

I agree.
For consumers, individual customers, aka.ms is good because it's easy to remember and there are no big security concerns.

There is a big security concern: it looks like a phishing URL

I think Microsoft should at least officially make an announcement, declaring something such as
"aka.ms is Microsoft-owned domain.",

This requires every person that ever receives one of these aka.ms links to have received, read, and remembered such a notice. That's a lot to ask.

@wsy
Copy link

wsy commented Sep 27, 2020

This requires every person that ever receives one of these aka.ms links to have received, read, and remembered such a notice. That's a lot to ask.

I don't think Microsoft needs to send that announcement to everyone. Publishing such notice on their websites will do.

@idontusenumbers
Copy link
Author

would mircosoft include this domain on their docs if it wasn't official?

Would a hacker that broke into the the microsoft docs and re-write them use a domain similar to aka.ms? would the hacker use microsoft.com?

@PsychoData
Copy link

PsychoData commented Dec 31, 2020

while I think most of this thread is excessive concern about phishing URLs, as an end-user if you go to the bare-url https://aka.ms , you are now redirected to https://redirectiontool.trafficmanager.net/am/redirection/home?options=host:aka.ms which redirects to a login page for the MS Redirection tool. Though it doesn't show you that anywhere on the screen - sample screen.

If an end user was to try to find information about aka.ms - the first thing that comes up in my search results is many instances of people asking if it is OK.

I was just updating a web site I have been helping on, and was hoping to find something official from Microsoft explaining what Aka.ms was that I could link to, and I couldn't find a reputable/official looking source to reference.

Worst of all, if a unauthorized (non-Microsoft, and non-Microsoft authorized tenant guests) was to fully log into the page - they get this error that would be confusing to most failed aka.ms redirection tool login

If someone tried to use an undefined, removed, or invalid aka.ms link - like https://aka.ms/DoesntExist, it takes you to Microsoft.com at least, but it should be much clearer that it is owned by Microsoft.

I see that https://aka.ms by itself redirecting into your internal redirection tool login page is easy for you all, but it would be confusing to most users.

I would love for there to be some way that https://aka.ms had a page with an explanation that this is a Microsoft service, a link to some Microsoft.com/aka-ms-url-shortener or similar page, and an explanation that only Microsoft or authorized contractors can access it to create these links, and most likely a "Login" button in the top right for you all to go to the https://redirectiontool.trafficmanager.net/am/redirection/home?options=host:aka.ms URL.

Given those additional steps, a user could

  • understandably be suspicious of the aka.ms links (as URL Shorteners could certainly be used maliciously to hide a malicious URL), but could learn that aka.ms is a trustworthy URL shortener because they
  • have some confirmation from Microsoft side of things that aka.ms is an official Microsoft domain,
  • anyone who came onto https://aka.ms by accident wouldn't directly be presented with a login page (which is certainly a security red flag), but an explanation it is an internal Microsoft URL Shortener

@acicali
Copy link

acicali commented Mar 10, 2021

I just opened PowerShell and was greeted with "Try the new cross-platform PowerShell https://aka.ms/pscore6". My first thought was... "uh oh, have I been infected?". I visited this URL and then experienced what seemed like several redirects, ultimately dropping me at https://login.microsoftonline.com/oauth2/authorize?---REMOVED_FOR_BREVITY---&redirect_uri=https://redirectiontool.trafficmanager.net---REMOVED_FOR_BREVITY---

Everything about this experience confirmed my belief that this was malware / phishing / bad news.

How can anyone actually confirm that aka.ms doesn't have bad properties in its database? This is double-plus-ungood.

@PsychoData
Copy link

I visited this URL and then experienced what seemed like several redirects, ultimately dropping me at https://login.microsoftonline.com/oauth2/authorize?---REMOVED_FOR_BREVITY---&redirect_uri=https://redirectiontool.trafficmanager.net---REMOVED_FOR_BREVITY---

did you possibly visit https://aka.ms and not https://aka.ms/pscore6 ?

Currently, if you go to the Root site directly (and not one of it's shortlinks) then it will have you try to sign in to determine if you can access the tool to create the ShortLinks. If you do not have access, it will show you errors similar to my previous message above.

https://aka.ms/pscore6
image

https://aka.ms just redirects to https://redirectiontool.trafficmanager.net/am/redirection/home?options=host:aka.ms

But then, that page may try to redirect you to a login page

But, I agree that this could look confusing to users who didn't know that aka.ms is owned by Microsoft and a Private URL Shortener for their internal use only

@PsychoData
Copy link

@cthombor

Hmmm... a good next step might be to look at some specific cases in which aka.ms is used, then classify as a use-case or a misuse-case. That's way out of my range of responsibility -- I'm just an end-user.

I'll now unsubscribe to this thread.... but as a parting gift I do have a case to offer: an email I received a month ago, with an aka.ms link. A flat-text version is appended. I have suppressed anything that's obviously-unhashed PII, and I'm ok with running the privacy-risk of posting this case to a public-viewable webarea.

  1. I can't be bothered to figure out how the aka.ms redirection pulls up my PII, but when I (finally!) dared to visit it a few minutes ago, my (Chrome) browser was redirected to https://login.microsoftonline.com/common/oauth2/authorize?response_type=id_token&client_id=AAAA&scope=openid&msafed=0&nonce=BBBB&response_mode=form_post&redirect_uri=https://businessstore.microsoft.com/auth/&state=%7B%22encodedRedirectUri%22:%22CCCC==%22,%22isEmbedded%22:false%7D&sso_reload=true. So: aka.ms redirection is apparently far more powerful than a tinyurl redirection. However: I think it unlikely that the target "AA1wm3t" of this aka.ms contains a hashed version of my PII because its only 8 chars long, and because the popup "Pick an account" window on this microsoftoneline.com visit isn't helping me navigate the portion of my personal-identity-hell that is directly administered by MS (i.e. I see four explicit options on the "Pick an account" list, plus the option to "Use another account".
  2. I suspect the png link is a tracker with a hashed reference to my account number, so I have anonymised it. It's an 115x27 png which would have displayed an MS graphic in my Outlook client, if I had ever allowed it to present this email to me in html. (BTW I run my Outlook in plaintext-only mode, as one of my lines of defense against email-nasties.)

Here's the anonymised case. Ignore if you like. I have already frittered away more than enough of my time on this issue!
From: Microsoft (do not reply) maccount@microsoft.com
...
View your Agreement(s) https://aka.ms/AA1wm3t .

Microsoft Corporation

Using a Redirect checker tool - https://www.redirecttracker.com/ -
You can see that the redirect path is https://aka.ms/AA1wm3t > https://businessstore.microsoft.com/manage/organization/agreements

If you are not already used with the Microsoft BusinessStore, then you will get a request to either Login to the business store, or Authorize the Business Store (To read your Email Address/OpenID and Verify your Identity). So there is definitely nothing about the Short Link that is linking to any form of PII - it is linking to a service, that then prompts you to log on because you weren't logged in or hadn't Authorized that app to access your information.

By the same sort of redirection, there is a good change this will redirect you to your Company's SharePoint domain (if you have one) even though I don't know your Company Name
http://bitly.com/3rCZ06J
Since bit.ly links have a feature that you can see where Bit.ly will redirect you to by appending a + to the end, http://bitly.com/3rCZ06J+
Using this, you can see that this redirects to https://login.microsoftonline.com/login.srf?wa=wsignin1.0&wreply=https://www.office.com/launch/sharepoint%3F&LoginOptions=1
This should show you a login page (if you aren't logged in) or when Login is finished, it should send you to https://www.office.com/launch/sharepoint where Office.com will handle resolving your SharePoint domain and sending you there

So, no PII is remotely included in the aka.ms Redirects - they send you to a web service from Microsoft, the Microsoft Service will see if you are already logged in, if needed it may send you to the Microsoft Sign In or Authorize pages, and the Microsoft Sign In may prompt you with a login/authorize page that mentions your company information, because the sign-in page had that information available from previous sessions/cookies/pass-thru from Windows/etc

@PsychoData
Copy link

@kendrikat

Is it safe now or what?

It has always been safe

@mcarlson-nvidia
Copy link

I got to this site because I was searching to see if AKA.ms was a legit site for a phishing expedition. So it is not just an assumption on the user who first posted this.

@acicali
Copy link

acicali commented Apr 10, 2021

@kendrikat

Is it safe now or what?

It has always been safe

This isn't entirely accurate though, is it? Since it's a redirection service, for it to be 100% safe it would have to vouch for all content it redirects to.

Even if only employees can add these redirects, that doesn't mean someone working at MS couldn't do something malicious, or even just by mistake. Or perhaps redirect to a domain that then expires and becomes the property of someone malicious.

Wouldn't be the first time this sort of thing has happened.

@PsychoData
Copy link

PsychoData commented Apr 10, 2021 via email

@idontusenumbers
Copy link
Author

It is significantly safer than a random public link shortener

The problem is that, as a person who sees and might click on that link, there's no reason to believe it's actually a Microsoft link. No matter how much safety there is on Microsoft's servers and in their internal policies and procedures, I still won't click the link because as far as I know, it's going to a hacker's server. These links are definitively not microsoft links, the are aka.ms links. They are indistinguishable from phishing attacks, full stop.

Additionally, Job safety is not a guarantee against unsavory behavior.

@PsychoData
Copy link

PsychoData commented Apr 10, 2021 via email

@idontusenumbers
Copy link
Author

by Microsoft and operated by Microsoft.

As a typical user, how would I know that? 99.99% of users won't know how to determine that.

You should trust links that are to the AKA.ms domain just as you would trust any link that a Microsoft employee sends you.

Why? I know microsoft.com takes me to Microsoft website, and I (a technology expert) can use built in browser tools to determine the certificate is good before clicking the link. Assuming aka.ms is wrongly identified to be potentially safe (it should NOT BE!!! It is a cliche example of a phishing attack domain!!!), and do the same with aka.ms, it suspicious redirects happen to what appears to be a phishing attack. I know I can use whois and inspect the certificate before the redirect but that is not something practically any users would be able to do.

but that's not a discussion for Microsoft that's a discussion for security training somewhere else.

100% of security training says DO NOT click links like aka.ms and DO NOT trust senders of such links. Microsoft should know this and not make links like aka.ms. I guarantee Microsoft administers mandatory security training to all of their employees that says DO NOT click links like this. This should have been obvious to all their employees, especially the ones who's career it is to avoid these things. They failed to make this realization so I reported this bug.

@PsychoData
Copy link

PsychoData commented Apr 10, 2021 via email

@idontusenumbers
Copy link
Author

still not something that Microsoft needs to be responsible for

Who else but Microsoft is responsible for sending links for microsoft properties? It would behoove them to make sure they do not smell phishy.

@Dantali0n
Copy link

Came here because I was convinced I was getting phished to enable 2FA, spent 15 minutes to figure out the email was legitimate. This is the extend of the confusion largely caused by the shortend url.

@laszukdawid
Copy link

Got an email from a recruiter with aka.ms link. Completely ignored it thinking that's some phishing attempt or weird marketing research. Was bothering me so decided to report this to Microsoft and what do you know, it's just a legit dodge looking url.

Since this thread is the first meaningful result from Google (the actual first result is in image), people will be coming here to check. And they will because, as two first comments by idontusenumbers, the domain looks super phishy.

Which part of "aka.ms" suggests that it's Microsoft? Definitely not "aka". Maybe with some imagination ms TLD would do but Microsoft doesn't own it and people don't think that much about Microsoft as maybe Microsoft employees do.

Doing external communication via aka.ms is shooting yourself in a foot. Pass it on(?).

image

@ashfurrow
Copy link

I just received an email from someone claiming to be with Microsoft’s Software Analysis and Intelligence Research Group asking me to fill out a survey for open source contributors on an aka.ms url. There are clearly MS employees who are using this shortener for external communication and it’s impeding the MS business interests.

@eross-msft
Copy link
Contributor

eross-msft commented Jul 6, 2021

We understand your concerns and frustrations. As a content organization, we've stepped away from using the aka.ms URLs; however, outside of our organization they are still in use. While we've talked to the product teams about this, they feel they are still of use and continue to use them. Because this thread is about the documentation, I'm going to close it to commenting now.

@dknappettmsft please lock this conversation. Thanks!

@MicrosoftDocs MicrosoftDocs locked as off-topic and limited conversation to collaborators Jul 6, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests