BlueDelta Hackers Target Microsoft OWA and Related Portals with Credential Harvesting

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

BlueDelta hackers, a state-linked Russian intelligence group, intensified credential-harvesting campaigns using fraudulent login portals that mimic Microsoft Outlook Web Access (OWA), Google, and VPN services to steal user credentials. The attackers deployed multi-stage phishing lures where initial bait documents redirect victims to credential-gathering pages hosted on disposable infrastructure. Stolen credentials include login names, passwords, and multi-factor codes, exfiltrated through free web hosting and tunneling services designed to evade reputation-based filters. These campaigns targeted professional and enterprise users, including those in energy research, defense cooperation, and government communication roles.

Who is affected

Users of OWA, cloud services, VPNs, and enterprise systems face direct exposure to credential theft, with downstream risk to internal network access and lateral compromise.

Why CISOs should care

Credential harvesting against enterprise authentication portals increases risk of unauthorized access, lateral movement, data theft, and potential compromise of privileged systems across business and government environments.

3 practical actions

Harden authentication portals: Implement user behavior analytics and risk-based access controls on OWA and cloud service login pages.

Enforce MFA and password policies: Require multi-factor authentication and strong, unique credentials across all enterprise accounts.

Detect abnormal login patterns: Monitor for phishing redirection signs and unusual authentication attempts from disposable hosting services.