SharePoint Phishing Exploits Trusted Links

SharePoint Phishing Exploits Trusted Links

Recent phishing attacks increasingly exploit SharePoint links to bypass security tools and harvest credentials through sophisticated multi-step validation processes. Attackers leverage trusted Microsoft platforms and stealthy hosting to evade detection and compromise user accounts with advanced MFA manipulations. #SharePointPhishing #MultiFactorAuthentication #MicrosoftPhishing

Keypoints

  • Phishing campaigns now utilize SharePoint-themed URLs to exploit user trust and evade detection by XDR and email security solutions.
  • Malicious content is hosted dynamically on SharePoint, making it difficult for automated tools to detect phishing pages.
  • Attackers implement a multi-phase validation process requiring victims’ emails and authentication codes, increasing attack legitimacy.
  • Compromised user accounts are exploited to add stealthy MFA methods and create malicious inbox rules and external user invitations.
  • Effective detection involves monitoring risky sign-in activities post SharePoint URL clicks and analyzing host timelines for malicious domains.
  • Immediate remediation includes resetting passwords, removing malicious MFA, blocking URLs and domains, and deleting phishing emails and inbox rules.
  • User education remains a critical defense against SharePoint-based phishing attacks.

MITRE Techniques

  • [T1530] Data from Cloud Storage Object – Attackers host malicious phishing pages and payloads dynamically on SharePoint, a trusted cloud platform, to bypass detection (“…attackers can easily host malicious content…within SharePoint…”).
  • [T1110] Brute Force – The attack includes a validation phase requiring the victim’s email and authentication code, targeting specific users and preventing generic bypass (“…only possible if the victim’s/recipient’s email is provided…”).
  • [T1098] Account Manipulation – Attackers add stealthy MFA methods to compromised accounts to maintain persistence without easy detection (“…attackers are adding authentication methods that are less visible…”).
  • [T1071] Application Layer Protocol – Use of legitimate Microsoft email and SharePoint URLs to distribute phishing links and validation codes, leveraging trusted protocols (“…legitimate Microsoft validation code, which further convinces users…”).
  • [T1114] Email Collection – Creation of malicious inbox rules and forwarding after compromise to exfiltrate data or distribute malware (“…attackers creating malicious inbox rules and forwarding malicious content…”).

Indicators of Compromise

  • [Domains] Malicious domains used for hosting phishing pages – ushackagea[.]ru, revishbos[.]ru, and domains like documents[.]rescloudofficeshareddrive365[.]com.
  • [Domains] Lookalike and deceptive Microsoft-themed domains – int-oracle[.]com, office[.]int-oracle[.]com.
  • [URLs] SharePoint phishing URLs with multi-stage validation sequences leading to credential harvesting pages (no specific examples provided).


Read more: https://www.cyberproof.com/blog/deceptive-links-unmasking-sharepoint-phishing-attacks/