New phishing campaign lures victims with compromised SharePoint website

The campaign was designed to go undetected by security products

Cyber criminals are using a compromised SharePoint website as a lure for a new phishing campaign.

Dora Tudor, a cyber security enthusiast at Heimdal Security, said the campaign relies on convincing emails and a few other techniques used to bypass phishing detection. These include an Office 365 phishing page, a Google cloud web app hosting, and a compromised SharePoint site that pushes victims to enter their credentials.

“It’s concerning to see that phishing remains a tricky issue that businesses are still facing, therefore the existence of phishing awareness pieces of training is highly recommended both by CISA and Microsoft,” she said.

According to a series of tweets by Microsoft researchers, the ongoing campaign used a combination of legitimate-looking original sender email addresses and spoofed display sender addresses that contain the target usernames and domains. The display names mimic legitimate services to try and slip through email filters.

The lure email pretends to be a “file share” request to access some so-called “Staff Reports,” “Bonuses,” “Pricebooks,” and other content hosted in a supposed Excel spreadsheet.

Researchers added the original sender addresses contain variations of the word "referral" and use various top-level domains, including the domain com[.]com, popularly used by phishing campaigns for spoofing and typo-squatting.

Related Resource

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

2021 state of email security report: Ransomware on the rise - whitepaper from MimecastDownload now

Cyber criminals then send emails that “use a SharePoint lure in the display name as well as the message,” researchers said. “This campaign is active with various lure themes.”

Microsoft researchers added that the emails contain two URLs with malformed HTTP headers. The primary phishing URL is a Google storage resource that points to an AppSpot domain that requires the user to sign in before finally serving another Google User Content domain with an Office 365 phishing page.

“The second URL is located within the notification settings and leads to a compromised SharePoint site that the attackers use to add legitimacy to the attack. Both URLs require sign-in to continue to the final page, bypassing many sandboxes,” researchers added.

Researchers warned that the campaign contained other detection evasion techniques that make this campaign even “sneakier than usual.” 

Researchers published a link on GitHub with more details on the campaign, including a query string on GitHub that can run through Microsoft 365 Defender to draw attention to any campaign email that may have gone unnoticed by email security products.

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

Researchers disclose top flaws abused by ransomware gangs
ransomware

Researchers disclose top flaws abused by ransomware gangs

20 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021
How do hackers choose their targets?
hacking

How do hackers choose their targets?

17 Sep 2021
Owner of DDoS for hire sites found guilty of hacking offences
distributed denial of service (DDOS)

Owner of DDoS for hire sites found guilty of hacking offences

17 Sep 2021

Most Popular

Zoom: From pandemic upstart to hybrid work giant
video conferencing

Zoom: From pandemic upstart to hybrid work giant

14 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021