Attackers used phony Microsoft site to target 2018 political candidates

But Microsoft says it saved the day.

Abrar Al-Heeti Technology Reporter
Abrar Al-Heeti is a technology reporter for CNET, with an interest in phones, streaming, internet trends, entertainment, pop culture and digital accessibility. She's also worked for CNET's video, culture and news teams. She graduated with bachelor's and master's degrees in journalism from the University of Illinois at Urbana-Champaign. Though Illinois is home, she now loves San Francisco -- steep inclines and all.
Expertise Abrar has spent her career at CNET analyzing tech trends while also writing news, reviews and commentaries across mobile, streaming and online culture. Credentials
  • Named a Tech Media Trailblazer by the Consumer Technology Association in 2019, a winner of SPJ NorCal's Excellence in Journalism Awards in 2022 and has three times been a finalist in the LA Press Club's National Arts & Entertainment Journalism Awards.
Abrar Al-Heeti

Microsoft declined to name the candidates.

Getty Images

Attackers attempted to use a phony version of Microsoft's website to make phishing attacks on three 2018 congressional candidates. 

The company found and stopped the cyberattack attempts, said Tom Burt, corporate vice president for customer security and trust at Microsoft, at the Aspen Security Forum in Colorado on Thursday. He declined to name the candidates, but said they were "all people who because of their positions might have been interesting from an espionage standpoint, as well as an election disruption standpoint."

Microsoft worked with the government to remove the domain and stop the attacks. 

Attackers also tried to use a phony Microsoft site during the 2016 Democratic Convention in Philadelphia, Burt said. 

In April, Microsoft launched its Defending Democracy Program, which aims to protect campaigns from hacking and increase online political ad transparency, among other things.