• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / How to report abuse and security issues on Microsoft services

How to report abuse and security issues on Microsoft services

2016-07-06 by Jason

A suspicious website was reported and it was rather convincing. The website was impersonating Microsoft and with Microsoft’s latest Windows 10 pushes, it did not seem implausible. Part of the disguise was the fact that the site was running with an Microsoft Azure subdomain. Even with a little bit of research, you might be convinced that the site is legitimate and belongs to Microsoft.

Looking at the source code, you could find several examples where the code is not up to Microsoft’s standards and there are suspicious sections commented out. Further, if you visit the site from a Mac, the website looks different and recommends MacKeeper, an “antivirus” loaded with suspicious add-in for macOS computers.

malicious_msft_spoof

Now that we have identified that the site is malicious, how do we report it to Microsoft so they can take it down and save others from reaching the site? To report a security incident or abuse on a Microsoft server, use the website https://cert.microsoft.com/ The website is a simple form to provide your contact information, the domain/IP address, a timestamp, and a description.

This form is to report suspected security issues or abuse of Microsoft Online Services, such as Bing, Hotmail, Windows Live, Windows Azure, and Office 365. This includes malicious network activity originating from a Microsoft IP address. It also includes distribution of malicious content or other illicit or illegal material through a Microsoft Online Service.

I filled out the form and submitted it. Hopefully Microsoft will investigate the issue promptly, confirm it, and remove the site according to their processes, preventing anybody else from becoming a victim to the malware that the site is spreading.

Filed Under: Security and Privacy Tagged With: microsoft

Trending

  • Run Disk Cleanup without calculating to Compress Old Files
    In Operating Systems, Tech Solutions
  • Don’t forget printers in your IoT security
    In Hardware, Gadgets, and Products, Security and Privacy
  • Marketing Automation – with SendPulse
    In Articles, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO   How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO  

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in