Phishing campaign targets victims with hacked SharePoint

(Image credit: wk1003mike / Shutterstock)

A dangerous new phishing campaign has been uncovered that uses compromised SharePoint sites and OneNote documents to trick potential victims from the banking sector to visit their landing pages.

The cybercriminals behind the campaign have chosen Microsoft's web-based SharePoint collaborative platform to launch their attacks because the domains it uses are often overlooked by secure email gateways and this allows their phishing messages to actually reach users' inboxes.

After compromising a SharePoint account, the attackers use that account to send an email to potential victims in which they ask them to review a legal assessors proposal via an URL embedded in the message. This new phishing campaign was discovered by researchers at Cofense who explained why its tactics are so effective in a blog post, saying:

“SharePoint is the initial delivery mechanism to deliver a secondary malicious URL, allowing the threat actor to circumvent just about any email perimeter technology.”

Hiding in plain sight

The URL in the initial message sends users to an attacker-controlled SharePoint site where a well-made fake OneNote document made to be illegible asks the targets to download the full version using an embedded link. However, this link actually sends bank employees to the attacker's phishing page.

On the phishing page, targets see a web page impersonating the official OneDrive for Business login page with a message above the login form which reads: “This document is secure, please login to view, edit or download. Select an option below to continue”.

From here, users are given the option to login with an Office 365 account or with their account from any other email provider. This way if a user is unwilling to give up their Office 365 credentials, the attackers will still get access to another one of their accounts.

Once a victim inputs their login credentials, they are collected automatically by the BlackShop Tools phishing kit used in the campaign and available for sale on the dark web.

To prevent falling victim to a phishing attack, it is recommended that you avoid opening emails from unknown contacts and carefully scrutinize the URLs of the websites you visit.

Via Bleeping Computer

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft authentication system spoofed via phishing attack
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Fraude en ligne phishing
Phishing clicks nearly tripled in 2024 as criminals aim for smarter attacks
A pair of hands using a keyboard
Microsoft SharePoint hijacked to spread Havoc malware
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)