Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishers Abuse SharePoint in New Campaign Targeting Energy Sector

Phishers Abuse SharePoint in New Campaign Targeting Energy Sector

Posted on January 23, 2026January 23, 2026 By CWS

Menace actors have been abusing SharePoint for payload supply in a brand new phishing marketing campaign concentrating on power organizations, Microsoft warns.

One multi‑stage assault analyzed by Microsoft began with adversary‑in‑the‑center (AitM) phishing, the place the sufferer obtained an electronic mail from the compromised account of a trusted group.

The message featured a doc‑sharing workflow theme and included a SharePoint URL that directed the sufferer to a touchdown web page prompting them for his or her Microsoft credentials.

Subsequent, the attackers arrange for enterprise electronic mail compromise (BEC), accessing the compromised inbox and creating guidelines to mark all messages as learn and delete incoming emails. They then despatched over 600 phishing emails to the sufferer’s contacts, with one other phishing URL.

“The recipients had been recognized based mostly on the current electronic mail threads within the compromised consumer’s inbox,” Microsoft explains.

The attackers monitored the compromised account, deleting undelivered and out-of-office responses, in addition to messages from recipients who questioned the authenticity of the phishing emails.Commercial. Scroll to proceed studying.

“The emails and responses had been then deleted from the mailbox. These strategies are widespread in any BEC assaults and are supposed to maintain the sufferer unaware of the attacker’s operations, thus serving to in persistence,” Microsoft explains.

The attackers mounted one other AitM assault in opposition to the recipients from inside the group who clicked on the phishing URL, the corporate notes.

To guard themselves from such assaults, organizations are suggested to implement multi-factor authentication (MFA) and allow conditional entry insurance policies in Microsoft Entra.

Nonetheless, as a result of AitM assaults consequence within the compromise of sign-in classes, remediation requires not solely resetting the compromised customers’ passwords but additionally revoking the classes and verifying that MFA has not been tampered with.

“Whereas AiTM phishing makes an attempt to avoid MFA, implementation of MFA stays a necessary pillar in identification safety and extremely efficient at stopping all kinds of threats. MFA is the rationale that risk actors developed the AiTM session cookie theft approach within the first place,” Microsoft notes.

Implementing steady entry analysis, passwordless sign-in, enabling networking safety in endpoint safety options, implementing safety options on cellular gadgets, and utilizing browsers that mechanically establish and block malicious web sites additionally assist mitigate the danger related to these assaults.

Associated: LastPass Customers Focused With Backup-Themed Phishing Emails

Associated: FBI: North Korean Spear-Phishing Assaults Use Malicious QR Codes

Associated: Advanced Routing, Misconfigurations Exploited for Area Spoofing in Phishing Assaults

Associated: AI Is Supercharging Phishing: Right here’s The way to Combat Again

Security Week News Tags:Abuse, Campaign, Energy, Phishers, Sector, SharePoint, Targeting

Post navigation

Previous Post: New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
Next Post: Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds

Related Posts

Hackers Abuse ConnectWise to Hide Malware Hackers Abuse ConnectWise to Hide Malware Security Week News
Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News
AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure Security Week News
Healthcare Services Group Data Breach Impacts 624,000 Healthcare Services Group Data Breach Impacts 624,000 Security Week News
743,000 Impacted by McLaren Health Care Data Breach 743,000 Impacted by McLaren Health Care Data Breach Security Week News
SimSpace Raises  Million for Cyber Range Platform SimSpace Raises $39 Million for Cyber Range Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark