Security News Office 365 Phishing Campaign Hides Malicious URLs in SharePoint Files

LDogg

Level 33
Thread author
Verified
Top Poster
Well-known
May 4, 2018
2,261
Office 365 Phishing Campaign Hides Malicious URLs in SharePoint Files


Researchers say the “PhishPoint” tactic has already impacted 10 percent of Office 365 users globally.

Researchers have detected a new phishing campaign that mainly targets Office 365 customers to harvest their credentials.
The campaign, dubbed “PhishPoint,” is spread to victims via emails containing a SharePoint document and invitation to collaborate. However, when clicked, the file contains a malicious URL that snatches end users’ credentials.
“PhishPoint marks an evolution in phishing attacks, where hackers go beyond just email and use SharePoint to harvest end-users’ credentials for Office 365,” said Avanan researchers in a post about the phishing campaign, Tuesday.

So far, the campaign has impacted 10 percent of Avanan’s Office 365 customers – and researchers estimate that this percentage “applies to Office 365 globally.” Microsoft did not respond to a request for comment from Threatpost on the new campaign.
Michael Landewe, founder of Avanan, told Threatpost that he first saw a sharp spike in the phishing campaign about three weeks ago: “It has either started using a larger list of pre-compromised accounts, or it has hit a critical mass of compromised accounts,” he said. “Or, there is a new group using the method and not as careful as the first group.”
Avanan researchers, who first discovered the campaign, said that the victim first receives an email containing a link to a SharePoint document. Victims’ emails were most likely harvested via a previous attack or were purchased from other bad actors, Landewe said. The message purports to be a standard SharePoint invitation to collaborate.
After clicking the hyperlink in the email, the victim’s browser will automatically open a SharePoint file, the content of which impersonates a standard access request to a OneDrive file. The OneDrive file contains an “Access Document” hyperlink which, in reality, is a malicious URL.

The link within the SharePoint file directs the user to a spoofed Office 365 login screen. When the user attempts to login, their credentials are harvested by the hacker.
“This attack specifically targets Office 365 credentials,” Landewe told us. “Once the user entered their credentials, they were redirected to a legitimate Office site where they would be none the wiser. If the new credentials were used, the attackers would upload a file into that person’s SharePoint account and send an invite from SharePoint (rather than from the user’s account).”

Office 365 does scan links in email bodies to look for blacklisted or suspicious domains – however, because the link in the email leads to an actual SharePoint document, Microsoft did not identify it as a threat.
“The crux of this attack is that Microsoft link-scanning only goes one level deep, scanning the links in the email body, but not within files hosted on their other services, such as SharePoint,” researchers said in their post.
In order to identify this threat, Microsoft would have to scan links within shared documents for phishing URLs, researchers added: “This presents a clear vulnerability that hackers have taken advantage of to propagate phishing attacks.”
Even if Microsoft did scan links within files, there’s an additional challenge: The URL couldn’t be blacklisted without blacklisting links to all SharePoint files. “If they blacklisted the full URL of the Sharepoint file, the hackers could easily create a new URL by uploading a new file with similar content to SharePoint,” researchers explained.
Researchers believe that specific companies are being targeted. “We have seen it in [Fortune] 500 companies in the U.S., as well as small, under-100-person companies in Europe,” said Landewe.
Phishing attacks continue to increase and adopt new tactics – and spam is increasing accordingly. A recent report this week by Kaspersky Lab found that spam email, in particular, remains a top phishing tactic. In the second quarter of 2018, the amount of spam peaked in May up to 51 percent; while the average share of spam in email traffic worldwide was 50 percent.
To protect themselves, researchers said there are basic good practices that companies can take, including being aware of any email subject line that capitalizes buzzwords for workplace stress (like “Urgent” or “Action Required”), and staying suspicious of any URLs that show up in the body of emails.

Thanks for reading.

~LDogg
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
Anyone who uses a password manager doesn't need to worry about these phishing attacks. When you land on a phishing site that wants your credentials, the password manager will not be able to provide them, because it will not recognize the site.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top