Microsoft SharePoint Abuse Enables AiTM Phishing and BEC Targeting Energy Sector Organizations

Related

Fake OpenAI Repository on Hugging Face Pushes Infostealer Malware

What happened A malicious Hugging Face repository impersonating OpenAI's Privacy...

Amazon SES Increasingly Abused in Phishing to Evade Detection

What happened Threat actors are exploiting Amazon Simple Email Service...

Robinhood Account Creation Flaw Abused to Send Phishing Emails

What happened Threat actors exploited a flaw in Robinhood's account...

NASA Employees Duped in Chinese Phishing Scheme Targeting Defense Software

What happened NASA's Office of Inspector General has released details...

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

What happened A law enforcement operation in early March seized...

Share

What happened

Threat actors leverage SharePoint services in sophisticated AiTM phishing campaign targeting energy sector organizations, according to Microsoft Defender researchers. The reported attack began with phishing emails sent from a compromised trusted vendor’s email address, containing Microsoft SharePoint URLs that required authentication and mimicked legitimate document-sharing workflows. Victims who clicked the SharePoint link were directed to fake login pages, enabling adversary-in-the-middle (AiTM) credential capture and session takeover. After initial access, attackers created inbox rules to delete incoming emails and mark messages as read to reduce visibility while monitoring compromised accounts. The campaign was described as evolving into broader business email compromise (BEC), including sending more than 600 phishing emails to contacts inside and outside victim organizations. The report also listed attacker infrastructure indicators, including IP addresses 178.130.46.8 and 193.36.221.10.

Who is affected

Energy sector organizations are directly affected in the reported targeting, particularly where Microsoft SharePoint and OneDrive workflows are trusted and heavily used. Indirect exposure extends to partners and suppliers when compromised vendor accounts are used to distribute authenticated-looking links into other organizations.

Why CISOs should care

AiTM campaigns can bypass password changes by stealing session tokens and can rapidly pivot into BEC by manipulating mailbox rules and trusted communication chains. Abuse of legitimate SharePoint/OneDrive URLs can reduce efficacy of traditional email security controls and increase cross-tenant supply-chain risk.

3 practical actions

  • Hunt for inbox-rule tampering: Detect and investigate creation of delete/mark-as-read rules and unusual mailbox settings changes in Microsoft 365.

  • Tighten controls on SharePoint link usage: Restrict anonymous sharing, review external sharing policies, and monitor authentication prompts originating from shared-file workflows.

  • Block known attacker infrastructure: Search authentication and proxy logs for 178.130.46.8 and 193.36.221.10 and investigate associated sign-in activity.
IMG 0514 2
+ posts

John Kevin Hao is a news and feature writer covering cybersecurity, technology, and business targeted for professional audiences.