Not content with Crypto Locking files on your computer, scammers are now targeting your Microsoft Account, e-mails and cloud content with the following scam

Have you recently seen an email similar to the following?

We’ve recently received emails from hacked email accounts which try to fool users into logging into their and steal your and Password. This is known as “

Because the email link looks like the file location of a genuine file, hovering your mouse over the link reveals a very different location

Even the fake landing page was made to look like a genuine login Page

The dummy site is attempting to capture your Microsoft login email and Password, so the hacker can hack into your Microsoft Account, Email and Online Files

You will never get beyond the above page, but by now the hacker knows your genuine login and password and unless you have Multi-Factor-Authentication (aka ) enabled, they can login, steal your data, send using your email account and even lock you out of your account.

If you have seen pages similar to the above that would not let you login, then you may have already been hacked.

Login to the genuine Microsoft Site (see below) change your Password Immediately and switch on Multi-Factor-Authentication (or have your administrator do so for you)

Login to your genuine Microsoft Account at this address:

goto “My Account” > “Security & Privacy” > “Password

and change your password immediately.

also click on “My Account” > “Security & Privacy” > “Additional security verification

And switch on Multi-Factor-Authentication using a Security-App or by associating a phone number to your account.

Need more help?

Covid-19 Update: as usual for workshop repairs, remote and onsite .

If you live in , and you need any kind of computer , please complete the form here before bringing your device or computer to us at 315 Rokeby Road, Subiaco, Western Australia or call us out by clicking here. You can email us at or call:

08 6118 2601 

Microsoft Silver Cloud Partner

For instant remote control sessions, follow the instructions found on this page