View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
August 16, 2018updated 17 Aug 2018 10:05am

Microsoft Office 365 Phishing Campaign Targets One in 10 Users

Researchers say SharePoint has been exploited to host malicious link

By CBR Staff Writer

A new phishing campaign which targets Microsoft’s Office 365 platform is estimated to have impacted up to 10 percent of users.

According to security researchers from Avanan, the widespread phishing campaign has been monitored over the past two weeks and blocked for the firm’s customers.

While 10 percent of customers have been targeted, the research team estimates that: “this percentage applies to Office 365 globally.”

Dubbed PhishPoint, the new campaign uses SharePoint, a collaborative platform which is compatible with Office 365, to harvest end-user credentials for the software.

The threat actors behind the new attack use SharePoint files to host phishing links. By inserting the link directly into SharePoint, Avanan says they are able to bypass built-in security measures.

“This leverages a critical flaw in Office 365, where their security focuses on email but neglects other Office 365 services,” the company says.

Victim Clicks

Targets and potential victims receive an email which invites them to open a SharePoint document. The form of the email is identical to a standard SharePoint invitation which makes the message appear legitimate.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

If the victim clicks on the document their browser automatically opens the file. The content then impersonates a standard SharePoint request to access a OneDrive file and displays an “Access Document” hyperlink which is malicious in nature.

The link then sends the user to a spoofed Office 365 login screen. Credentials input into the screen is then harvested. Victims would then be sent to the legitimate service and would be unlikely to realize anything was amiss.

Avanan researchers commented that: “To protect against potential threats, Office 365 scans links in email bodies to look for blacklisted or suspicious domains.”

“Since the link in the email leads to an actual SharePoint document, Microsoft did not identify it as a threat.”

In other words, Microsoft’s security protocols when it comes to scanning for blacklisted and known malicious links only goes skin-deep.

Files which are hosted on other services — including SharePoint — are not scanned fully to ascertain whether or not shared documents contain malicious links.

“This presents a clear vulnerability that hackers have taken advantage of to propagate phishing attacks,” the cybersecurity firm added.

However, this “vulnerability” is not one which can easily be patched. Blacklisting a link in a SharePoint file would require the file itself to be banned, and all it would take to circumvent this barrier is for a threat actor to upload a new file.

Michael Landewe, the founder of Avanan, said the campaign appears to be focusing on Fortune 500 companies in the United States, as well as small SMBs across Europe.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU