Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Posted on January 24, 2026January 24, 2026 By CWS

Microsoft Defender researchers have uncovered a complicated adversary-in-the-middle (AiTM) phishing marketing campaign concentrating on power sector organizations by SharePoint file-sharing abuse.

The multi-stage assault compromised a number of person accounts and advanced into widespread enterprise e mail compromise (BEC) operations throughout a number of organisations.

Preliminary Compromise By means of Trusted Vendor

The assault started with phishing emails despatched from a compromised trusted vendor’s e mail handle. Risk actors leveraged SharePoint URLs requiring authentication, mimicking authentic document-sharing workflows to evade suspicion.

Attackers exploited the widespread belief in Microsoft SharePoint and OneDrive providers, that are ubiquitous in enterprise environments and regularly bypass conventional e mail safety filters.

AiTM phishing assault (supply: Microsoft)

After victims clicked malicious SharePoint hyperlinks and entered credentials on pretend login pages, attackers gained entry to person periods.

The menace actors instantly created inbox guidelines to delete incoming emails and mark messages as learn, sustaining stealth whereas monitoring compromised accounts. This tactic prevented victims from discovering suspicious exercise or receiving safety alerts.

Following preliminary compromise, attackers launched an enormous phishing marketing campaign exceeding 600 emails to contacts inside and out of doors the sufferer group.

The marketing campaign focused recipients recognized from current e mail threads in compromised inboxes, considerably increasing the assault floor.

Attackers actively monitored sufferer mailboxes, deleting undelivered and out-of-office notifications to keep away from detection.

When recipients questioned suspicious emails, menace actors responded from compromised accounts to falsely affirm legitimacy earlier than deleting the dialog threads.

These methods helped preserve persistence whereas conserving victims unaware of ongoing operations.

Microsoft Defender Consultants recognized extra compromised customers based mostly on touchdown IP and sign-in patterns, revealing the marketing campaign’s intensive attain throughout a number of organizations within the power sector.

Microsoft emphasizes that password resets alone are inadequate for AiTM assault remediation. Organizations should revoke lively session cookies, take away attacker-created inbox guidelines, and reset any MFA settings modified by menace actors.

AiTM assault (supply: Microsoft)

Attackers can preserve entry by stolen session cookies even after password adjustments, as they might register various MFA strategies utilizing attacker-controlled telephone numbers.

Microsoft recommends implementing conditional entry insurance policies that consider sign-in requests utilizing id indicators like IP location, gadget standing, and person group membership.

Steady entry analysis, safety defaults in Azure Energetic Listing, and superior anti-phishing options present extra layers of protection.

Organizations ought to deploy Microsoft Defender XDR, which detects suspicious actions together with a number of account sign-in makes an attempt and malicious inbox rule creation.

Indicators of Compromise:

178.130.46.8 (Attacker infrastructure)

193.36.221.10 (Attacker infrastructure)

Vitality sector organizations ought to instantly hunt for these IP addresses in authentication logs and examine any related sign-in exercise.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, AiTM, Campaign, Leverage, Phishing, Services, SharePoint, Sophisticated, Threat

Post navigation

Previous Post: New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
Next Post: Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Related Posts

SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
Phishing Tactics Exploit Safe Links with Complex URL Rewrites Phishing Tactics Exploit Safe Links with Complex URL Rewrites Cyber Security News
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark