Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Via OneDrive Attacking C-level Employs for Corporate Credentials

Posted on September 2, 2025September 2, 2025 By CWS

A classy spear-phishing marketing campaign has emerged focusing on senior executives and C-suite personnel throughout a number of industries, leveraging Microsoft OneDrive as the first assault vector.

The marketing campaign makes use of fastidiously crafted emails masquerading as inner HR communications about wage amendments to trick high-profile targets into surrendering their company credentials.

This newest menace represents a regarding escalation in social engineering ways, combining customized content material with superior evasion strategies to bypass conventional safety measures.

The attackers make use of a methodical method, starting with “warming up” recipient inboxes by sending benign preliminary emails days earlier than launching the precise phishing try.

E mail Physique Content material (Supply – Stripe OLT)

The malicious emails function topic strains containing “Wage modification” or “FIN_SALARY” references and seem as official OneDrive document-sharing notifications.

Every message is meticulously personalized with the recipient’s title and firm particulars, considerably enhancing the marketing campaign’s credibility and chance of success.

Stripe OLT analysts recognized this marketing campaign whereas monitoring menace panorama actions, discovering that attackers are using Amazon Easy E mail Service (SES) infrastructure for supply whereas rotating by means of roughly 80 completely different domains and subdomains to evade detection.

Credential Phishing Web page (Supply – Stripe OLT)

The phishing infrastructure spans a number of service suppliers, together with Cloudflare for DNS companies, Akamai Cloud for internet hosting, and primarily Mat Bao Company for area registration, demonstrating the marketing campaign’s refined operational safety method.

Superior Evasion Methods

The marketing campaign employs significantly intelligent anti-detection mechanisms that exploit e mail consumer show variations. When seen in normal mild mode, e mail buttons seem as innocuous “Open” and “Share” labels.

Nevertheless, switching to darkish mode reveals hid padding containing randomized alphanumeric strings comparable to “twPOpenHuxv” and “gQShareojxYl” that fragment high-value set off phrases, successfully circumventing string-based detection guidelines employed by safe e mail gateways.

The credential harvesting web page presents a convincing Microsoft Workplace/OneDrive login interface that requests authentication particulars beneath the pretense of accessing a safe wage doc.

These phishing URLs are designed for single-use entry, robotically self-destructing after being visited to remove forensic proof and complicate incident response efforts.

Safety groups can implement focused looking queries to establish potential compromise makes an attempt.

The next KQL question can detect emails matching noticed topic patterns:-

EmailEvents
| the place Topic incorporates “FIN_SALARY”
| the place EmailDirection == “Inbound”
| venture Timestamp, RecipientEmailAddress, SenderMailFromDomain, Topic

Organizations ought to instantly block recognized malicious domains together with letzdoc.com, hr-fildoc.com, and docutransit.com whereas implementing enhanced consciousness coaching particularly focusing on executives and their administrative employees who stay main targets for these refined assaults.

Increase your SOC and assist your staff shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Attacking, Clevel, Corporate, Credentials, Employs, OneDrive, Phishing

Post navigation

Previous Post: New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
Next Post: Google Confirms That Claims of Major Gmail Security Warning are False

Related Posts

Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Cyber Security News
Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data Cyber Security News
Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News