A sophisticated phishing scam is targeting construction companies across Canada, using a clever technique to bypass traditional security measures. This article explains how the scam works and provides actionable steps to protect your business.

Example of the phishing scam targeting construction companies
The Scam: How It Works
Anatomy of the Scam
The attackers are using a technique called "branded phishing" to create convincing fake Microsoft sign-in pages. They send emails that appear to be from legitimate sources, such as project managers or suppliers, with links to what looks like a Microsoft login page.
The Attack Method
The key to their success is that they're using actual Microsoft domains for the initial part of the URL, making it harder for traditional security tools to detect the scam. For example, they might use a URL like: https://login.microsoftonline.com.evil-domain.com
Advanced Attack Technique
This technique is particularly effective because: 1. The URL starts with a legitimate Microsoft domain 2. The page looks identical to the real Microsoft login 3. The attackers use HTTPS, making the connection appear secure 4. They target specific individuals with personalized messages
Here's how that part works:
- After a user logs into the fake Microsoft sign-in page, attackers immediately use those credentials to attempt a real-time login to the actual Microsoft 365 platform.
- If the user is currently authenticated on their device, or if the attackers can trick them into completing the MFA challenge, the criminals can extract a valid authentication token.
- With this token in hand, attackers can bypass MFA altogether, effectively gaining long-term access to the user's account without needing to repeat the login or MFA process.
The Impact
From there, if the account is over permissioned, they can move laterally across the organization's email environment, impersonate staff, send out further phishing emails, and access sensitive internal data.
This blend of phishing and token-based hijacking is extremely dangerous because it combines credential theft with real-time identity compromise, all while maintaining the appearance of a legitimate user session.
These kinds of attacks are no longer "spray-and-pray"—they are targeted, intelligent, and persistent, exploiting both human trust and technical gaps.
How to Detect the Scam
To protect your organization, be on the lookout for the following red flags:
Unexpected RFP Emails
Be cautious of unsolicited RFPs, especially if you haven't initiated contact with the sender's organization.
Generic Language
Emails lacking personalized details or specific project information may indicate a phishing attempt.
Urgent or Pressuring Language
Scammers often create a sense of urgency to prompt quick action without due diligence.
Suspicious Links
Hover over links to verify their legitimacy before clicking. Be wary of URLs that don't match the purported sender's domain.
Requests for Credentials
Legitimate organizations will not ask you to enter sensitive information through unsecured links.
The Importance of Branding Your Microsoft Sign-In Page
Branding your Microsoft 365 sign-in page is a crucial step in defending against phishing attacks. Here's why:
Visual Verification
Customized branding helps users quickly verify the authenticity of the login page.
User Awareness
Consistent branding educates users on what legitimate sign-in pages look like, making it easier to spot fakes.
Enhanced Trust
A branded login page reinforces trust in your organization's digital communications.
3rd party sites, even from your partners will not display your branding. If you see don't see your brand while signing into a 3rd party site, it's a phishing site. There's also few reasons for a 3rd party site to kick you over to your Microsoft 365 login page unless your IT group has set it up for Single Sign On (SSO).
Implementing custom branding can be done through the Microsoft 365 admin center, allowing you to add your company's logo, colors, and background images to the sign-in experience.
Strengthen Your Defense with ITDR
ITDR (Identity Threat Detection and Response) is no longer an optional part of your IT security platform, it's required. Bolster your organization's security posture by investing in Identity Threat Detection and Response (ITDR) solutions. These tools monitor for suspicious activities, detect potential breaches, and respond to threats in real-time.
The ITDR tool we use offers comprehensive protection for as little as $5 per licensed user per month. With features like continuous monitoring, automated threat response, and detailed reporting, you can ensure your organization's identities remain secure.
Immediate Actions if Compromised
If you suspect that your organization has fallen victim to this phishing scam:
Cease All Activity
Stop using the compromised device immediately.
Notify IT/Security Teams
Inform your internal security personnel to initiate incident response protocols.
Reset Credentials
Change passwords for affected accounts and any others using the same credentials.
Enable Multi-Factor Authentication (MFA)
Add an extra layer of security to your accounts.
Educate Employees
Conduct training sessions to raise awareness about phishing tactics and prevention strategies.
Stay vigilant and proactive in protecting your organization against evolving cyber threats. Implementing robust security measures and fostering a culture of awareness are key to mitigating risks.
Warning Signs to Watch For
- Emails requesting immediate action or containing urgent deadlines
- Links to unfamiliar websites or shortened URLs
- Requests for sensitive information or login credentials
- Poor grammar or spelling in the email content
- Suspicious sender email addresses that don't match the claimed organization
Protecting Your Business
To safeguard your construction business from this and similar scams, implement these essential security measures:
Employee Training
Regular cybersecurity awareness training for all staff members
Identity Threat Detection and Response (ITDR)
Sophisticated threats need sophisticated tools. ITDR tools monitor for suspicious activities, detect potential breaches, and respond to threats in real-time.
Multi-Factor Authentication & Unique Passwords
Enable MFA for all business accounts and systems and use unique passwords for each account. Even if one account is compromised, the attacker will not be able to access other accounts.
What to Do If You're Targeted
If you or your employees receive a suspicious email:
Do not click any links or download attachments
This is the first step to protect your organization from phishing attacks.
Report the email to your IT department or security team
Reporting suspicious emails helps us to understand the scope of the problem and take appropriate action.
Delete the email immediately
Deleting suspicious emails prevents them from being opened and potentially compromising your organization.
If credentials were compromised, change passwords immediately
Changing passwords for affected accounts and any others using the same credentials is crucial to protect your organization's data.
Contact your financial institutions if any financial information was shared
If your organization's financial information was compromised, it's important to notify your financial institutions immediately.