home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 2283 
 Mike Powell to All 
 MS SharePoint exploited t 
 24 Jan 26 10:20:51 
 
TZUTC: -0500
MSGID: 2041.consprcy@1:2320/105 2dda214c
PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0
TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
FORMAT: flowed
Microsoft SharePoint exploited to hack multiple energy firms

Date:
Fri, 23 Jan 2026 18:10:00 +0000

Description:
Hackers are abusing SharePoint to break into people's emails and propagate
further throughout the networks.

FULL STORY

Hackers are, once again, using SharePoint to target large energy firms, steal
employee email credentials, and propagate the attack further. 

This is according to a new report from Microsoft, which claims multiple large
organizations in the energy sector were already targeted. 

The attack starts from a previously compromised email account . The crooks 
use it for initial contact, sending a legitimate-looking email with a
SharePoint link. When clicked, the link redirects the victims to a
credential-harvesting website, where they are prompted to log in.

What to do to stay safe

Victims that try to log in actually share their credentials with the
attackers, who gain access to real corporate email accounts, and access them
from a different IP address. After that, they take a few steps to establish
persistence while hiding from the victims. 

Those steps include creating an inbox rule to delete incoming messages, and
marking emails as read. 

In the final step, the attackers send large volumes of new phishing emails to
both internal and external contacts, as well as distribution lists. The
inboxes are monitored, delivery failure and OOO emails are deleted and, in
order to maintain the appearance of legitimacy, responses are read and
questions are answered. 

Microsoft did not share the details about the campaign and its success. We
dont know the exact number of organizations targeted, or how many people had
their inboxes compromised as a result. 

The company did stress that for those that are compromised, simply resetting
the password will not suffice, since the crooks created rules and changed
settings that enable persistence even when they are ousted. 

"Even if the compromised user's password is reset and sessions are revoked,
the attacker can set up persistence methods to sign-in in a controlled manner
by tampering with MFA ," Microsoft warns. 

"For instance, the attacker can add a new MFA policy to sign in with a
one-time password (OTP) sent to the attacker's registered mobile number. With
these persistence mechanisms in place, the attacker can have control over the
victim's account despite conventional remediation measures." 

Besides MFA, Microsoft also suggested conditional access policies that can
trigger alarms if certain conditions are met. 

 Via The Register 

======================================================================
Link to news story:
https://www.techradar.com/pro/security/microsoft-sharepoint-exploited-to-hack-
multiple-energy-firms

$$
--- SBBSecho 3.28-Linux
 * Origin: Capitol City Online (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700
SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470
SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45
SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca