Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Via OneDrive Attacking C-level Employs for Corporate Credentials

Posted on September 2, 2025September 2, 2025 By CWS

A classy spear-phishing marketing campaign has emerged focusing on senior executives and C-suite personnel throughout a number of industries, leveraging Microsoft OneDrive as the first assault vector.

The marketing campaign makes use of fastidiously crafted emails masquerading as inner HR communications about wage amendments to trick high-profile targets into surrendering their company credentials.

This newest menace represents a regarding escalation in social engineering ways, combining customized content material with superior evasion strategies to bypass conventional safety measures.

The attackers make use of a methodical method, starting with “warming up” recipient inboxes by sending benign preliminary emails days earlier than launching the precise phishing try.

E mail Physique Content material (Supply – Stripe OLT)

The malicious emails function topic strains containing “Wage modification” or “FIN_SALARY” references and seem as official OneDrive document-sharing notifications.

Every message is meticulously personalized with the recipient’s title and firm particulars, considerably enhancing the marketing campaign’s credibility and chance of success.

Stripe OLT analysts recognized this marketing campaign whereas monitoring menace panorama actions, discovering that attackers are using Amazon Easy E mail Service (SES) infrastructure for supply whereas rotating by means of roughly 80 completely different domains and subdomains to evade detection.

Credential Phishing Web page (Supply – Stripe OLT)

The phishing infrastructure spans a number of service suppliers, together with Cloudflare for DNS companies, Akamai Cloud for internet hosting, and primarily Mat Bao Company for area registration, demonstrating the marketing campaign’s refined operational safety method.

Superior Evasion Methods

The marketing campaign employs significantly intelligent anti-detection mechanisms that exploit e mail consumer show variations. When seen in normal mild mode, e mail buttons seem as innocuous “Open” and “Share” labels.

Nevertheless, switching to darkish mode reveals hid padding containing randomized alphanumeric strings comparable to “twPOpenHuxv” and “gQShareojxYl” that fragment high-value set off phrases, successfully circumventing string-based detection guidelines employed by safe e mail gateways.

The credential harvesting web page presents a convincing Microsoft Workplace/OneDrive login interface that requests authentication particulars beneath the pretense of accessing a safe wage doc.

These phishing URLs are designed for single-use entry, robotically self-destructing after being visited to remove forensic proof and complicate incident response efforts.

Safety groups can implement focused looking queries to establish potential compromise makes an attempt.

The next KQL question can detect emails matching noticed topic patterns:-

EmailEvents
| the place Topic incorporates “FIN_SALARY”
| the place EmailDirection == “Inbound”
| venture Timestamp, RecipientEmailAddress, SenderMailFromDomain, Topic

Organizations ought to instantly block recognized malicious domains together with letzdoc.com, hr-fildoc.com, and docutransit.com whereas implementing enhanced consciousness coaching particularly focusing on executives and their administrative employees who stay main targets for these refined assaults.

Increase your SOC and assist your staff shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Attacking, Clevel, Corporate, Credentials, Employs, OneDrive, Phishing

Post navigation

Previous Post: New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
Next Post: Google Confirms That Claims of Major Gmail Security Warning are False

Related Posts

Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Cyber Security News
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data Cyber Security News
PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers Cyber Security News
Linux 6.16 Released – Optimized for Better Performance and Networking Cyber Security News
HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
  • Sendmarc appoints Rob Bowker as North American Region Lead
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
  • Sendmarc appoints Rob Bowker as North American Region Lead
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News