Sophisticated Phishing Campaign Exploits OneDrive to Target C-Level Executives

A new and highly sophisticated spear-phishing campaign has been identified, specifically targeting senior executives and C-suite personnel across various industries. This campaign leverages Microsoft OneDrive as the primary attack vector, employing meticulously crafted emails that masquerade as internal human resources communications regarding salary amendments. The objective is to deceive high-profile targets into divulging their corporate credentials.

Escalation in Social Engineering Tactics

This emerging threat signifies a significant escalation in social engineering tactics. By combining personalized content with advanced evasion techniques, the attackers effectively bypass traditional security measures. The campaign’s methodical approach begins with warming up recipient inboxes by sending benign preliminary emails days before initiating the actual phishing attempt.

Anatomy of the Attack

The malicious emails are characterized by subject lines containing phrases such as Salary amendment or FIN_SALARY, presenting themselves as legitimate OneDrive document-sharing notifications. Each message is meticulously customized with the recipient’s name and company details, significantly enhancing the campaign’s credibility and increasing the likelihood of success.

Analysts from Stripe OLT identified this campaign while monitoring threat landscape activities. They discovered that attackers are utilizing Amazon Simple Email Service (SES) infrastructure for email delivery, rotating through approximately 80 different domains and subdomains to evade detection.

Sophisticated Phishing Infrastructure

The phishing infrastructure spans multiple service providers, including Cloudflare for DNS services, Akamai Cloud for hosting, and primarily Mat Bao Corporation for domain registration. This demonstrates the campaign’s sophisticated operational security approach, making it challenging for traditional security measures to detect and mitigate the threat.

Advanced Evasion Techniques

One of the campaign’s most notable features is its clever anti-detection mechanisms that exploit differences in email client displays. When viewed in standard light mode, email buttons appear as innocuous Open and Share labels. However, switching to dark mode reveals concealed padding containing randomized alphanumeric strings such as twPOpenHuxv and gQShareojxYl. These strings fragment high-value trigger words, effectively circumventing string-based detection rules employed by secure email gateways.

Credential Harvesting Tactics

The credential harvesting page presents a convincing Microsoft Office/OneDrive login interface, requesting authentication details under the pretense of accessing a secure salary document. These phishing URLs are designed for single-use access, automatically self-destructing after being visited. This tactic eliminates forensic evidence and complicates incident response efforts.

Detection and Mitigation Strategies

Security teams can implement targeted hunting queries to identify potential compromise attempts. For instance, the following KQL query can detect emails matching observed subject patterns:

“`
EmailEvents
| where Subject contains FIN_SALARY
| where EmailDirection == Inbound
| project Timestamp, RecipientEmailAddress, SenderMailFromDomain, Subject
“`

Organizations are advised to immediately block identified malicious domains, including letzdoc.com, hr-fildoc.com, and docutransit.com. Additionally, implementing enhanced awareness training specifically targeting executives and their administrative staff is crucial, as they remain primary targets for these sophisticated attacks.

Broader Context of Phishing Attacks on Executives

This campaign is part of a broader trend where cybercriminals increasingly target high-ranking company executives. An evolving phishing campaign observed since May 2020 has been found to target executives across manufacturing, real estate, finance, government, and technological sectors with the goal of obtaining sensitive information. These attacks often involve sending emails containing fake Office 365 password expiration notifications, redirecting users to phishing pages for credential harvesting. ([thecyberpost.com](https://thecyberpost.com/news/hackers/attacks/targeted-phishing-attacks-strike-high-ranking-company-executives/?utm_source=openai))

The Appeal of Targeting C-Level Executives

C-suite executives are particularly appealing targets for cybercriminals due to their access to sensitive information and decision-making powers. Unlike their lower-level counterparts, executives may not undergo extensive cybersecurity training due to time constraints, focusing instead on strategic business matters. This situation creates a window of opportunity for attackers to exploit potential human errors. ([breachspot.com](https://breachspot.com/news/vulnerabilities/targeting-executives-phishing-tactics-ascend-the-corporate-ladder/?utm_source=openai))

Recommendations for Organizations

To mitigate the risks associated with such sophisticated phishing campaigns, organizations should consider the following measures:

1. Educate Executives About Phishing and Spear Phishing: Provide security awareness training and phishing simulation tools to ensure executives are aware of the threats they face online. Greater awareness of security risks and best practices will help them detect phishing scams and avoid handing over sensitive information. ([terranovasecurity.com](https://www.terranovasecurity.com/blog/office-365-phishing-campaign-targeting-c-suite-executives?utm_source=openai))

2. Implement Multi-Factor Authentication (MFA): Adding an extra layer of security by requiring users to enter a code sent to their phones or generated by a physical device before gaining access can significantly reduce the chances of unauthorized access, even if login credentials are compromised. ([linkedin.com](https://www.linkedin.com/pulse/executive-phishing-attacks-email-really-from-your-boss?utm_source=openai))

3. Keep Security Software Up to Date: Ensure that all applications, software, networking tools, and operating systems are updated so that they don’t have any vulnerabilities. Install anti-malware protection and anti-spam software for an extra layer of defense. ([terranovasecurity.com](https://www.terranovasecurity.com/blog/office-365-phishing-campaign-targeting-c-suite-executives?utm_source=openai))

4. Outline Phish Reporting Protocols: Let executives know how to report suspected phishing attempts. If there is a live threat, the IT department can quickly protect other users and information from being exposed. ([terranovasecurity.com](https://www.terranovasecurity.com/blog/office-365-phishing-campaign-targeting-c-suite-executives?utm_source=openai))

5. Implement Email Filtering and Anti-Phishing Tools: Use email filtering software to filter out phishing emails. This serves as the first line of defense against malicious communications. ([linkedin.com](https://www.linkedin.com/pulse/executive-phishing-attacks-email-really-from-your-boss?utm_source=openai))

Conclusion

The emergence of this sophisticated phishing campaign exploiting Microsoft OneDrive underscores the evolving nature of cyber threats targeting high-level executives. By understanding the tactics employed by attackers and implementing comprehensive security measures, organizations can better protect their executives and sensitive corporate information from such malicious activities.