{"id":45157,"date":"2026-04-07T02:34:21","date_gmt":"2026-04-06T18:34:21","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins\/"},"modified":"2026-04-07T02:34:21","modified_gmt":"2026-04-06T18:34:21","slug":"missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins\/","title":{"rendered":"Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins"},"content":{"rendered":"\n<p>The way wars are fought today has changed, and our smartphones have become part of the battle. Hackers <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/hackers-fake-red-alert-rocket-alert-app-spy-israel-users\/\" data-type=\"post\" data-id=\"142305\">always want to cash in<\/a> on political or regional conflicts, and they are now connecting their scams with the latest news about the US, Israel, and Iran.<\/p>\n<p>As we know it, when people are worried about what they see on the news, they are more likely to make mistakes in real life. Researchers at email security firm Cofense have found that these scammers send out fake emergency alerts to scare people into handing over their passwords.<\/p>\n<h3><strong>The QR code trap<\/strong><\/h3>\n<p>The Cofense Phishing Defense Center (PDC) recently found that hackers are pretending to be the Ministry of Interior and Civil Defense, and send out emails with the subject Public Safety Advisory \u2013 Action Recommended. These emails often come from a fake address: <code><a href=\"\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"513c383f38222523283e37383f253423383e237c323827383d353437343f22343f3425263e233a112024303d382528323e3d3d343225383e3f7f323e3c7f3024\">[email&#160;protected]<\/a><\/code>.<\/p>\n<p>While the phishing emails do not explicitly mention the phrase &#8220;Iran missile alert,&#8221; the language used, such as urgent missile warnings and instructions to seek shelter, closely mirrors real civil defence alerts seen during regional tensions involving Israel and Iran. This context makes the \u201cIranian missile alert\u201d framing reasonable from an editorial standpoint, even if it is not directly stated in the scam message itself.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details.png\"><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"965\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details.png 715w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-222x300.png 222w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-380x513.png 380w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" alt=\"Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins\" \/><\/a><figcaption>Lure email (Source: Cofense)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>The messages are written to make you panic. They show a SEVERE \/ ACTIVE warning and tell you to take cover immediately because of a missile attack. Instead of a normal web link, they ask you to scan a <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/qr-code\/\">QR code<\/a> to see official emergency procedures. However, as per Cofense\u2019s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/cofense.com\/blog\/weaponizing-fear-iran-conflict-themed-phishing-uses-fake-emergency-alerts\">report<\/a>, shared with Hackread.com, this is a trick to get past security filters.<\/p>\n<p>\u201cThis is a classic example of social engineering, leveraging panic and authority to trick users into acting quickly without verification. The repeated phrasing, lack of personalization, and reliance on a QR code instead of a verified source all indicate a mass phishing attempt designed to exploit situations of panic and prompt impulsive actions,\u201d researchers noted.<\/p>\n<p><strong>Stealing Microsoft passwords<\/strong><\/p>\n<p>When the victim scans the code, they are redirected to a fake human check page at <code>ministry.sharedfilescorps.com\/interior\/$<\/code>, where they have to click a box to prove they are not a robot. When done, they are sent to a fake Microsoft login page, which looks just like the real one, but it is actually a trap used to steal their login credentials.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script data-cfasync=\"false\" src=\"\/cdn-cgi\/scripts\/5c5dd728\/cloudflare-static\/email-decode.min.js\"><\/script><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"439\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1.png 866w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1-300x152.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1-768x389.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1-380x193.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-Iran-Conflict-Alerts-Used-to-Steal-Microsoft-Login-Details-1-800x406.png 800w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" alt=\"Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins\" \/><\/a><figcaption>Fake Microsoft login page (Source: Cofense)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>By using the famous <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/microsoft\/\">Microsoft<\/a> name and pretending to be a government office, these hackers make their lies look very real. According to researchers, they are &#8220;exploiting fear-driven narratives&#8221; to catch people while they are distracted by the news. Experts suggest that to stay safe, you should never type your password into a site you found through an unexpected QR code.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The way wars are fought today has changed, and our smar [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45157","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45157"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45157\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}