Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
Friday, April 10
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Cyber Attacks & Exploits

AiTM Phishing Campaign Exploits SharePoint for BEC Attacks

V DiwaharBy V DiwaharJanuary 24, 2026Updated:March 24, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

A recently uncovered AiTM phishing campaign shows how modern cyberattacks are increasingly designed to look and feel like routine business activity. According to researchers at Microsoft, threat actors deliberately abused familiar collaboration tools to gain access, remain unnoticed, and eventually turn compromised accounts into launchpads for large-scale fraud.

By misusing Microsoft SharePoint, attackers blended seamlessly into everyday workflows—making it extremely difficult for employees to tell the difference between legitimate work and a malicious operation.

Why This AiTM Phishing Campaign Worked So Well

This adversary-in-the-middle phishing attack did not rely on obvious red flags. Instead, it took advantage of habits employees have built over years of working in cloud environments.

People expect to:

  • Receive SharePoint links
  • Log into Microsoft 365 multiple times a day
  • Collaborate with vendors and external partners

Attackers leaned into this familiarity. Victims were sent convincing emails containing SharePoint file links that appeared completely normal. When users clicked and logged in, the attackers quietly intercepted authenticated sessions using session cookie theft attacks, effectively pulling off MFA bypass phishing without the victim ever realizing something went wrong. From the user’s point of view, the document simply failed to load or appeared to open normally, while the attacker walked away with full access.

AiTM Phishing Campaign Exploits SharePoint for BEC Attacks
Attack chain: AiTM phishing attack (source:Microsoft)

Trusted Vendor Email Compromise: Lowering Defenses Instantly

The campaign began with a trusted vendor email compromise, which made the initial phishing emails even more convincing. Messages came from real partner accounts, referenced genuine business processes, and included realistic context.

This is where Microsoft SharePoint abuse proved especially powerful. A SharePoint phishing attack does not feel like phishing at all it feels like work. Because SharePoint and OneDrive links are so common, they often bypass both automated security filters and human skepticism.

Once attackers gained access, they were inside Microsoft 365 environments with no malware, no exploit, and no immediate warning signs.

Staying Invisible with Inbox Rule Abuse

Rather than acting quickly and noisily, attackers focused on staying hidden. They used inbox rule abuse attacks to quietly clean up any signs of compromise deleting incoming messages, marking emails as read, and filtering out security alerts.

Victims continued their day-to-day work completely unaware. Meanwhile, attackers observed email conversations, learned communication patterns, and waited for the right moment to act. This slow, patient approach is becoming standard in identity-based cyberattacks, where stealth is more valuable than speed.

From Account Takeover to Business Email Compromise (BEC)

Once trust was fully established, the operation escalated into a widespread business email compromise (BEC) attack but at a much larger scale. In some cases, attackers sent more than 600 phishing emails from a single compromised account.

These were not generic messages. They were pulled from real email threads, making them highly believable. This is what makes a Microsoft 365 phishing campaign so dangerous: attackers are not guessing they are continuing real conversations.

When recipients questioned legitimacy, attackers responded directly from compromised accounts, reassured them, and then deleted the conversation to erase any trace. This level of interaction allowed the enterprise phishing campaign to spread quietly across organizations and partners.

Why the Energy Sector Was a Prime Target

Microsoft Defender analysts found that many victims were part of energy sector cyberattacks, a space where collaboration with vendors and contractors is constant. These trusted relationships gave attackers an ideal environment to move laterally from one organization to another.

Once a single account was compromised, existing trust did the rest. No exploits were needed—only access, patience, and social engineering.

The Hard Truth: Password Resets Are Not Enough

One of the most important lessons from this campaign is that password resets alone do not stop AiTM attacks. Because attackers steal active sessions, they can remain logged in even after credentials are changed. Some even went further by modifying MFA settings to maintain access.

Effective remediation requires revoking sessions, removing malicious inbox rules, and auditing identity settings in Azure Active Directory (Microsoft Entra ID).

Detection, Defense, and Reality Check

Microsoft recommends layered identity defenses supported by Microsoft Defender XDR, including conditional access policies, continuous access evaluation, and active monitoring for suspicious sign-ins and mailbox changes insights drawn directly from Microsoft Defender threat research. These controls are no longer optional. They are essential.

Indicators of Compromise

Security teams should immediately investigate authentication activity tied to the following attacker infrastructure:

  • 178.130.46.8
  • 193.36.221.10

Any related sign-ins should be treated as high-risk.

Final Thoughts

This AiTM phishing campaign highlights a simple but uncomfortable reality: today’s most effective attacks look ordinary. By turning trusted platforms like SharePoint into attack vectors, threat actors are exploiting not just technology, but routine human behavior.

As cloud-based phishing attacks continue to grow, organizations must move beyond assuming that familiar tools are safe by default. Continuous identity monitoring, rapid session revocation, and user awareness are now critical not just for preventing breaches, but for noticing when one is already underway.

Related posts:

  1. Is Your Security Enough? Top 5 Underestimated Cyber Threats on the Rise
  2. How Big Data is Driving New Cybersecurity Measures
  3. Inside the ICC Cyber Attack: How Hackers Targeted Global Justice in 2025
  4. SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleFortiGate Firewall Hacked in Automated Attacks Stealing Configuration Data (2026)
Next Article 149 Million Passwords Exposed Online in Massive Infostealer Malware Leak
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Read More

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026
Read More

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.