Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Posted on January 24, 2026January 24, 2026 By CWS

Microsoft Defender researchers have uncovered a complicated adversary-in-the-middle (AiTM) phishing marketing campaign concentrating on power sector organizations by SharePoint file-sharing abuse.

The multi-stage assault compromised a number of person accounts and advanced into widespread enterprise e mail compromise (BEC) operations throughout a number of organisations.

Preliminary Compromise By means of Trusted Vendor

The assault started with phishing emails despatched from a compromised trusted vendor’s e mail handle. Risk actors leveraged SharePoint URLs requiring authentication, mimicking authentic document-sharing workflows to evade suspicion.

Attackers exploited the widespread belief in Microsoft SharePoint and OneDrive providers, that are ubiquitous in enterprise environments and regularly bypass conventional e mail safety filters.

AiTM phishing assault (supply: Microsoft)

After victims clicked malicious SharePoint hyperlinks and entered credentials on pretend login pages, attackers gained entry to person periods.

The menace actors instantly created inbox guidelines to delete incoming emails and mark messages as learn, sustaining stealth whereas monitoring compromised accounts. This tactic prevented victims from discovering suspicious exercise or receiving safety alerts.

Following preliminary compromise, attackers launched an enormous phishing marketing campaign exceeding 600 emails to contacts inside and out of doors the sufferer group.

The marketing campaign focused recipients recognized from current e mail threads in compromised inboxes, considerably increasing the assault floor.

Attackers actively monitored sufferer mailboxes, deleting undelivered and out-of-office notifications to keep away from detection.

When recipients questioned suspicious emails, menace actors responded from compromised accounts to falsely affirm legitimacy earlier than deleting the dialog threads.

These methods helped preserve persistence whereas conserving victims unaware of ongoing operations.

Microsoft Defender Consultants recognized extra compromised customers based mostly on touchdown IP and sign-in patterns, revealing the marketing campaign’s intensive attain throughout a number of organizations within the power sector.

Microsoft emphasizes that password resets alone are inadequate for AiTM assault remediation. Organizations should revoke lively session cookies, take away attacker-created inbox guidelines, and reset any MFA settings modified by menace actors.

AiTM assault (supply: Microsoft)

Attackers can preserve entry by stolen session cookies even after password adjustments, as they might register various MFA strategies utilizing attacker-controlled telephone numbers.

Microsoft recommends implementing conditional entry insurance policies that consider sign-in requests utilizing id indicators like IP location, gadget standing, and person group membership.

Steady entry analysis, safety defaults in Azure Energetic Listing, and superior anti-phishing options present extra layers of protection.

Organizations ought to deploy Microsoft Defender XDR, which detects suspicious actions together with a number of account sign-in makes an attempt and malicious inbox rule creation.

Indicators of Compromise:

178.130.46.8 (Attacker infrastructure)

193.36.221.10 (Attacker infrastructure)

Vitality sector organizations ought to instantly hunt for these IP addresses in authentication logs and examine any related sign-in exercise.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, AiTM, Campaign, Leverage, Phishing, Services, SharePoint, Sophisticated, Threat

Post navigation

Previous Post: New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
Next Post: Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Related Posts

Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed Cyber Security News
How Threat Intelligence Will Change Cybersecurity in 2026 How Threat Intelligence Will Change Cybersecurity in 2026 Cyber Security News
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild Cyber Security News
Vortex Werewolf Targets Russian Networks with Tor Vortex Werewolf Targets Russian Networks with Tor Cyber Security News
Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Cyber Security News
93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web 93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News