Not content with Crypto Locking files on your computer, scammers are now targeting your Account, e-mails and cloud content with the following scam

Have you recently seen an email similar to the following?

We’ve recently received emails from hacked email accounts which try to fool users into logging into their Account and steal your login and Password. This is known as “Phishing

Because the email link looks like the file location of a genuine SharePoint file, hovering your mouse over the link reveals a very different location

Even the fake landing page was made to look like a genuine login Page

The dummy site is attempting to capture your login email and Password, so the hacker can hack into your Microsoft Account, Email and Online Files

You will never get beyond the above page, but by now the hacker knows your genuine login and password and unless you have Multi-Factor-Authentication (aka 2FA) enabled, they can login, steal your data, send spam using your email account and even lock you out of your account.

If you have seen pages similar to the above that would not let you login, then you may have already been hacked.

Login to the genuine Site (see below) change your Password Immediately and switch on Multi-Factor-Authentication (or have your administrator do so for you)

Login to your genuine Account at this address:

goto “My Account” > “Security & Privacy” > “Password

and change your password immediately.

also click on “My Account” > “Security & Privacy” > “Additional security verification

And switch on Multi-Factor-Authentication using a Security-App or by associating a number to your account.

Need more help?

Covid-19 Update: as usual for workshop repairs, and onsite support.

If you live in Western Australia, and you need any kind of computer help, please complete the form here before bringing your device or computer to us at 315 Rokeby Road, Subiaco, Western Australia or call us out by clicking here. You can email us at or call:

08 6118 2601 

Microsoft Silver Cloud Partner

For instant remote control sessions, follow the instructions found on this page