Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Posted on January 24, 2026January 24, 2026 By CWS

Microsoft Defender researchers have uncovered a complicated adversary-in-the-middle (AiTM) phishing marketing campaign concentrating on power sector organizations by SharePoint file-sharing abuse.

The multi-stage assault compromised a number of person accounts and advanced into widespread enterprise e mail compromise (BEC) operations throughout a number of organisations.

Preliminary Compromise By means of Trusted Vendor

The assault started with phishing emails despatched from a compromised trusted vendor’s e mail handle. Risk actors leveraged SharePoint URLs requiring authentication, mimicking authentic document-sharing workflows to evade suspicion.

Attackers exploited the widespread belief in Microsoft SharePoint and OneDrive providers, that are ubiquitous in enterprise environments and regularly bypass conventional e mail safety filters.

AiTM phishing assault (supply: Microsoft)

After victims clicked malicious SharePoint hyperlinks and entered credentials on pretend login pages, attackers gained entry to person periods.

The menace actors instantly created inbox guidelines to delete incoming emails and mark messages as learn, sustaining stealth whereas monitoring compromised accounts. This tactic prevented victims from discovering suspicious exercise or receiving safety alerts.

Following preliminary compromise, attackers launched an enormous phishing marketing campaign exceeding 600 emails to contacts inside and out of doors the sufferer group.

The marketing campaign focused recipients recognized from current e mail threads in compromised inboxes, considerably increasing the assault floor.

Attackers actively monitored sufferer mailboxes, deleting undelivered and out-of-office notifications to keep away from detection.

When recipients questioned suspicious emails, menace actors responded from compromised accounts to falsely affirm legitimacy earlier than deleting the dialog threads.

These methods helped preserve persistence whereas conserving victims unaware of ongoing operations.

Microsoft Defender Consultants recognized extra compromised customers based mostly on touchdown IP and sign-in patterns, revealing the marketing campaign’s intensive attain throughout a number of organizations within the power sector.

Microsoft emphasizes that password resets alone are inadequate for AiTM assault remediation. Organizations should revoke lively session cookies, take away attacker-created inbox guidelines, and reset any MFA settings modified by menace actors.

AiTM assault (supply: Microsoft)

Attackers can preserve entry by stolen session cookies even after password adjustments, as they might register various MFA strategies utilizing attacker-controlled telephone numbers.

Microsoft recommends implementing conditional entry insurance policies that consider sign-in requests utilizing id indicators like IP location, gadget standing, and person group membership.

Steady entry analysis, safety defaults in Azure Energetic Listing, and superior anti-phishing options present extra layers of protection.

Organizations ought to deploy Microsoft Defender XDR, which detects suspicious actions together with a number of account sign-in makes an attempt and malicious inbox rule creation.

Indicators of Compromise:

178.130.46.8 (Attacker infrastructure)

193.36.221.10 (Attacker infrastructure)

Vitality sector organizations ought to instantly hunt for these IP addresses in authentication logs and examine any related sign-in exercise.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, AiTM, Campaign, Leverage, Phishing, Services, SharePoint, Sophisticated, Threat

Post navigation

Previous Post: New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
Next Post: Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Related Posts

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Cyber Security News
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability Cyber Security News
Miggo Security Named a Gartner® Cool Vendor in AI Security Cyber Security News
Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts Cyber Security News
Dark Web Job Market Evolved Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign
  • New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
  • Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
  • Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign
  • New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
  • Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
  • Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark