Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读全文,抓住主要信息。 文章主要讲的是微软警告的一个针对能源行业的网络攻击活动。攻击者利用SharePoint和OneDrive这些可信服务进行钓鱼,然后创建收件箱规则来保持持久性和逃避检测。他们还进行了中间人攻击和商业电邮欺诈,导致大规模的钓鱼活动。 接下来,我需要提取关键点:攻击目标是能源行业,使用了SharePoint和OneDrive,中间人攻击,商业电邮欺诈,大规模钓鱼邮件,以及删除邮件以隐藏痕迹。 现在要将这些信息浓缩到100字以内。确保涵盖攻击方式、目标、技术手段以及影响。同时避免使用“文章内容总结”之类的开头。 最后组织语言,确保简洁明了。 </think> 微软警告称,针对能源行业的网络攻击利用SharePoint和OneDrive等可信服务进行钓鱼和商业电邮欺诈。攻击者通过创建收件箱规则维持持久性并隐藏活动,并发起大规模钓鱼邮件以扩大影响范围。 2026-1-23 08:25:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector.

"The campaign abused SharePoint file‑sharing services to deliver phishing payloads and relied on inbox rule creation to maintain persistence and evade user awareness," the Microsoft Defender Security Research Team said. "The attack transitioned into a series of AitM attacks and follow-on BEC activity spanning multiple organizations."

As part of post-exploitation activity following initial compromise, the unknown attackers have been found to leverage trusted internal identities from the victim to carry out large‑scale intra‑organizational and external phishing in an effort to cast a wide net and widen the scope of the campaign.

The starting point of the attack is a phishing email likely sent from an email address belonging to a trusted organization, which was compromised beforehand. Abusing this legitimate channel, the threat actors sent out messages masquerading as SharePoint document‑sharing workflows to give it a veneer of credibility and trick recipients into clicking on phishing URLs.

Cybersecurity

Because services like SharePoint and OneDrive are widely used in enterprise environments and the emails originate from a legitimate address, they are unlikely to raise suspicion, allowing adversaries to deliver phishing links or stage malicious payloads. This approach is also called living-off-trusted-sites (LOTS), as it weaponizes the familiarity and ubiquity of such platforms to subvert email‑centric detection mechanisms.

The URL, for its part, redirects users to a fake credential prompt to view the purported document. Armed with access to the account using the stolen credentials and the session cookie, the attackers create inbox rules to delete all incoming emails and mark all emails as read. With this foundation in place, the compromised inbox is used to send phishing messages containing a fake URL designed to conduct credential theft using an AitM attack.

In one case, Microsoft said the attacker initiated a large-scale phishing campaign involving more than 600 emails that were sent to the compromised user's contacts, both within and outside of the organization. The threat actors have also been observed taking steps to delete undelivered and out of office emails, and assure message recipients of the email's authenticity if they raised any concerns. The correspondence is then deleted from the mailbox.

"These techniques are common in any BEC attacks and are intended to keep the victim unaware of the attacker's operations, thus helping in persistence," the Windows maker noted.

Microsoft said the attack highlights the "operational complexity" of AitM, stating password resets alone cannot remediate the threat, as impacted organizations must ensure that they have revoked active session cookies and removed attacker-created inbox rules used to evade detection.

To that end, the company noted that it worked with customers to revoke multi-factor authentication (MFA) changes made by the attacker on the compromised user's accounts and delete suspicious rules created on those accounts. It's currently not known how many organizations were compromised and if it's the work of any known cybercrime group.

Organizations are advised to work with their identity provider to make sure security controls like phishing-resistant MFA are in place, enable conditional access policies, implement continuous access evaluation, and use anti-phishing solutions that monitor and scan incoming emails and visited websites.

The attack outlined by Microsoft highlights the ongoing trend among threat actors to abuse trusted services such as Google Drive, Amazon Web Services (AWS), and Atlassian's Confluence wiki to redirect to credential harvesting sites and stage malware. This eliminates the need for attackers to build out their own infrastructure as well as makes malicious activity appear legitimate.

The disclosure comes as identity services provider Okta said it detected custom phishing kits that are designed specifically for use in voice phishing (aka vishing) campaigns targeting Google, Microsoft, Okta, and a wide range of cryptocurrency platforms. In these campaigns, the adversary, posing as tech support personnel, calls prospective targets using a spoofed support hotline or company phone number.

The attacks aim to trick users into visiting a malicious URL and hand over their credentials, which are subsequently relayed to the threat actors in real-time via a Telegram channel, granting them unauthorized access to their accounts. The social engineering efforts are well planned, with the attackers conducting reconnaissance on the targets and crafting customized phishing pages.

The kits, sold on an as-a-service basis, come fitted with client-side scripts that make it possible for threat actors to control the authentication flow in the browser of a targeted user in real-time, as they provide verbal instructions and convince them to take actions (e.g., approve push notifications or enter one-time passwords) that would lead to an MFA bypass.

"Using these kits, an attacker on the phone to a targeted user can control the authentication flow as that user interacts with credential phishing pages," said Moussa Diallo, threat researcher at Okta Threat Intelligence. "They can control what pages the target sees in their browser in perfect synchronization with the instructions they are providing on the call. The threat actor can use this synchronization to defeat any form of MFA that is not phishing-resistant."

Cybersecurity

In recent weeks, phishing campaigns have exploited Basic Authentication URLs (i.e., "username:password@domain[.]com") by placing a trusted domain in the username field, followed by an @ symbol and the actual malicious domain to visually mislead the victim.

"When a user sees a URL that begins with a familiar and trusted domain, they may assume the link is legitimate and safe to click," Netcraft said. "However, the browser interprets everything before the @ symbol as authentication credentials, not as part of the destination. The real domain, or the one that the browser connects to, is included after the @ symbol."

Other campaigns have resorted to simple visual deception tricks like using "rn" in place of "m" to conceal malicious domains and deceive victims into thinking they are visiting a legitimate domain associated with companies like Microsoft ("rnicrosoft[.]com"), Mastercard ("rnastercard[.]de"), Marriott ("rnarriotthotels[.]com"), and Mitsubishi ("rnitsubishielectric[.]com"). This is called a homoglyph attack.

"While attackers often aim at brands that start with the letter M for this technique, some of the most convincing domains come from swapping an internal 'm' with 'rn' inside words," Netcraft's Ivan Khamenka said. "This technique becomes even more dangerous when it appears in words that organizations commonly use as part of their brand, subdomains, or service identifiers. Terms like email, message, member, confirmation, and communication all contain mid-word m's that users barely process."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/microsoft-flags-multi-stage-aitm.html
如有侵权请联系:admin#unsafe.sh