Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Phishers Abuse SharePoint in New Campaign Targeting Energy Sector

Posted on January 23, 2026January 23, 2026 By CWS

Menace actors have been abusing SharePoint for payload supply in a brand new phishing marketing campaign concentrating on power organizations, Microsoft warns.

One multi‑stage assault analyzed by Microsoft began with adversary‑in‑the‑center (AitM) phishing, the place the sufferer obtained an electronic mail from the compromised account of a trusted group.

The message featured a doc‑sharing workflow theme and included a SharePoint URL that directed the sufferer to a touchdown web page prompting them for his or her Microsoft credentials.

Subsequent, the attackers arrange for enterprise electronic mail compromise (BEC), accessing the compromised inbox and creating guidelines to mark all messages as learn and delete incoming emails. They then despatched over 600 phishing emails to the sufferer’s contacts, with one other phishing URL.

“The recipients had been recognized based mostly on the current electronic mail threads within the compromised consumer’s inbox,” Microsoft explains.

The attackers monitored the compromised account, deleting undelivered and out-of-office responses, in addition to messages from recipients who questioned the authenticity of the phishing emails.Commercial. Scroll to proceed studying.

“The emails and responses had been then deleted from the mailbox. These strategies are widespread in any BEC assaults and are supposed to maintain the sufferer unaware of the attacker’s operations, thus serving to in persistence,” Microsoft explains.

The attackers mounted one other AitM assault in opposition to the recipients from inside the group who clicked on the phishing URL, the corporate notes.

To guard themselves from such assaults, organizations are suggested to implement multi-factor authentication (MFA) and allow conditional entry insurance policies in Microsoft Entra.

Nonetheless, as a result of AitM assaults consequence within the compromise of sign-in classes, remediation requires not solely resetting the compromised customers’ passwords but additionally revoking the classes and verifying that MFA has not been tampered with.

“Whereas AiTM phishing makes an attempt to avoid MFA, implementation of MFA stays a necessary pillar in identification safety and extremely efficient at stopping all kinds of threats. MFA is the rationale that risk actors developed the AiTM session cookie theft approach within the first place,” Microsoft notes.

Implementing steady entry analysis, passwordless sign-in, enabling networking safety in endpoint safety options, implementing safety options on cellular gadgets, and utilizing browsers that mechanically establish and block malicious web sites additionally assist mitigate the danger related to these assaults.

Associated: LastPass Customers Focused With Backup-Themed Phishing Emails

Associated: FBI: North Korean Spear-Phishing Assaults Use Malicious QR Codes

Associated: Advanced Routing, Misconfigurations Exploited for Area Spoofing in Phishing Assaults

Associated: AI Is Supercharging Phishing: Right here’s The way to Combat Again

Security Week News Tags:Abuse, Campaign, Energy, Phishers, Sector, SharePoint, Targeting

Post navigation

Previous Post: New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
Next Post: Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds

Related Posts

Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News
Descope Raises $35 Million in Seed Round Extension Security Week News
US Insurance Industry Warned of Scattered Spider Attacks Security Week News
CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities Security Week News
Adobe Patches Critical Vulnerability in Connect Collaboration Suite Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark