CybersecuritySharePoint Exploited in Phishing Campaigns Against Energy Sector

SharePoint Exploited in Phishing Campaigns Against Energy Sector

Key Takeaways

  • Unknown attackers are targeting energy-sector organizations using Microsoft SharePoint file-sharing services to harvest user credentials and send phishing emails.
  • The attackers use previously compromised email addresses to gain initial access and create inbox rules to delete incoming emails and mark them as read.
  • The attackers send new phishing emails from compromised accounts to contacts inside and outside the organization, using subject lines such as "New Proposal – NDA" to appear legitimate.
  • Enabling multi-factor authentication (MFA) and conditional access policies can help prevent these types of attacks.
  • Investing in anti-phishing products can also help scan incoming messages and visited websites for potential threats.

Introduction to the Attack
Unknown attackers are abusing Microsoft SharePoint file-sharing services to target multiple energy-sector organizations, harvest user credentials, take over corporate inboxes, and send hundreds of phishing emails from compromised accounts to contacts inside and outside those organizations. The attackers likely used previously-compromised email addresses to gain initial access to the targeted organizations. These email addresses were used to send emails containing a SharePoint URL that required user authentication, with subject lines such as "New Proposal – NDA" to make them appear legitimate. People who clicked on the URL were redirected to a website that required them to enter user credentials, thus giving the criminals valid usernames and passwords to use in later stages of these attacks.

The Attack Methodology
The attackers signed in to the compromised accounts with another IP address and created an inbox rule to delete all incoming emails and mark all the emails as read. This allowed them to remain undetected and continue their malicious activities without being noticed by the account owners. From these compromised inboxes, the attackers sent out new phishing emails – in one case involving more than 600 emails sent with another phishing URL. The recipients of these emails were identified based on the recent email threads in the compromised user’s inbox, and the emails were sent to the compromised user’s contacts, both within and outside of the organization, as well as distribution lists.

Post-Compromise Activities
After sending out the new phishing emails, the attacker kept an eye on the victim’s inbox, deleting any out-of-office or undeliverable messages. They also read email responses and responded to any questions about the legitimacy of the phish. These emails and responses were also later deleted by the attacker, making it difficult to detect the malicious activities. Anyone from within an energy organization who clicked on the malicious URL was also targeted for credential theft and account takeover. The attackers’ goal was to maintain control over the compromised accounts and continue sending phishing emails to harvest more credentials and gain access to sensitive information.

Mitigation and Remediation
While the usual recommendation for any type of identity compromise is to reset the password, in these types of attacker-in-the-middle scams, a password reset alone is not sufficient to address the issue. According to Microsoft, even if the compromised user’s password is reset and sessions are revoked, the attacker can set up persistence methods to sign-in in a controlled manner by tampering with multi-factor authentication (MFA). For instance, the attacker can add a new MFA policy to sign in with a one-time password (OTP) sent to the attacker’s registered mobile number. With these persistence mechanisms in place, the attacker can have control over the victim’s account despite conventional remediation measures.

Prevention and Protection
To prevent these types of attacks, Microsoft recommends enabling MFA, which remains an essential pillar in stopping a range of cyber threats. Additionally, enabling conditional access policies that evaluate sign-in requests using additional identity-driven signals like user or group membership, IP location information, and device status can help prevent attackers from gaining access to compromised accounts. If these signals trigger a security alert, the suspicious sign-in is denied. Investing in anti-phishing products that scan incoming messages and visited websites can also help detect and prevent phishing attacks. By taking these measures, organizations can reduce the risk of falling victim to these types of attacks and protect their sensitive information.

Conclusion
The attack on energy-sector organizations using Microsoft SharePoint file-sharing services highlights the importance of implementing robust security measures to prevent cyber threats. By enabling MFA, conditional access policies, and investing in anti-phishing products, organizations can reduce the risk of falling victim to these types of attacks. It is essential for organizations to be aware of these types of attacks and take proactive measures to protect their sensitive information and prevent cyber threats. By staying vigilant and taking the necessary precautions, organizations can minimize the risk of cyber attacks and maintain the security and integrity of their systems and data.

- Advertisement -spot_img

More From UrbanEdge

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...

Queensland Flood Warning, Alerts & Weekend Forecast

Queensland braces for heavy rain and potential flooding as a low-pressure trough stalls over the state. With predicted rainfall of 100-300mm through Sunday, authorities urge preparedness. SE regions may face disruptions, extending the alert to northeast New South Wales. Prepare emergency kits and plans now...

Brisbane Flood Risk: Storms Predicted to End Heatwave

Brisbane residents brace for storms set to end the relentless heatwave. Expect heavy rainfall, with up to 150mm in some areas, increasing flood risks, especially in low-lying regions. Flash floods are possible, and temperatures could drop by 10 degrees. Prepare emergency kits and stay updated on weather developments...

Apple Zero-Day Fix: Sophisticated Attack Solution & Patch

Apple has urgently patched two zero-day vulnerabilities in WebKit used in highly complex attacks targeting specific individuals. Security experts emphasize immediate updates to protect against these threats, linked to advanced actors, possibly nation-states. The overlapping nature of these exploits suggests a coordinated effort...

Windows 11 Notepad Vulnerability: Silent File Execution via Markdown Links

A critical vulnerability in Windows 11 Notepad's Markdown feature allows remote code execution via malicious links, posing a serious risk to users. Microsoft has issued a patch, but immediate updates and extra defenses are essential to prevent exploitation and ensure secure computing environments...

Microsoft Store Outlook Add-in Hijack Steals 4,000 Accounts

A sophisticated attack on Microsoft Outlook users has emerged, compromising over 4,000 accounts through the hijacked AgreeTo add-in. Hackers exploited an abandoned domain to steal Microsoft credentials directly from the Marketplace, bypassing usual security measures and impacting both user data and financial information...

CISA Mandate: Upgrade & Identify Unsupported Edge Devices for Agencies

CISA mandates federal agencies to replace unsupported edge devices prone to advanced threat actor exploits. Agencies have three months to identify, 12 months to begin upgrades, and 18 months for full remediation to protect network perimeters from cyber threats. SecureEdge Solutions offers assistance in securing network vulnerabilities...

Coinbase Insider Breach: Leaked Support Tool Screenshots

In May 2025, Coinbase experienced a sophisticated insider breach affecting 70,000 users. Hackers bribed support agents to leak sensitive data, resulting in over $2 million in theft through targeted scams. Coinbase responded by refusing ransom, launching a bounty program, and refunding victims...

Sector Impact Overview: Architecting the AI Integration Era

Sector Impact Overview: Architecting the AI Integration Era 1. Introduction:...
- Advertisement -spot_img