Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Microsoft SharePoint. Show all posts

Attackers Hijack Microsoft Email Accounts to Launch Phishing Campaign Against Energy Firms

 


Cybercriminals have compromised Microsoft email accounts belonging to organizations in the energy sector and used those trusted inboxes to distribute large volumes of phishing emails. In at least one confirmed incident, more than 600 malicious messages were sent from a single hijacked account.

Microsoft security researchers explained that the attackers did not rely on technical exploits or system vulnerabilities. Instead, they gained access by using legitimate login credentials that were likely stolen earlier through unknown means. This allowed them to sign in as real users, making the activity harder to detect.

The attack began with emails that appeared routine and business-related. These messages included Microsoft SharePoint links and subject lines suggesting formal documents, such as proposals or confidentiality agreements. To view the files, recipients were asked to authenticate their accounts.

When users clicked the SharePoint link, they were redirected to a fraudulent website designed to look legitimate. The site prompted them to enter their Microsoft login details. By doing so, victims unknowingly handed over valid usernames and passwords to the attackers.

After collecting credentials, the attackers accessed the compromised email accounts from different IP addresses. They then created inbox rules that automatically deleted incoming emails and marked messages as read. This step helped conceal the intrusion and prevented account owners from noticing unusual activity.

Using these compromised inboxes, the attackers launched a second wave of phishing emails. These messages were sent not only to external contacts but also to colleagues and internal distribution lists. Recipients were selected based on recent email conversations found in the victim’s inbox, increasing the likelihood that the messages would appear trustworthy.

In this campaign, the attackers actively monitored inbox responses. They removed automated replies such as out-of-office messages and undeliverable notices. They also read replies from recipients and responded to questions about the legitimacy of the emails. All such exchanges were later deleted to erase evidence.

Any employee within an energy organization who interacted with the malicious links was also targeted for credential theft, allowing the attackers to expand their access further.

Microsoft confirmed that the activity began in January and described it as a short-duration, multi-stage phishing operation that was quickly disrupted. The company did not disclose how many organizations were affected, identify the attackers, or confirm whether the campaign is still active.

Security experts warn that simply resetting passwords may not be enough in these attacks. Because attackers can interfere with multi-factor authentication settings, they may maintain access even after credentials are changed. For example, attackers can register their own device to receive one-time authentication codes.

Despite these risks, multi-factor authentication remains a critical defense against account compromise. Microsoft also recommends using conditional access controls that assess login attempts based on factors such as location, device health, and user role. Suspicious sign-ins can then be blocked automatically.

Additional protection can be achieved by deploying anti-phishing solutions that scan emails and websites for malicious activity. These measures, combined with user awareness, are essential as attackers increasingly rely on stolen identities rather than software flaws.


Colt Technology Services Hit by Cyberattack, Faces Multi-Day Service Outage

 

UK-based telecom giant Colt Technology Services is battling a cyberattack that has disrupted several of its operations for multiple days, including Colt Online, hosting services, porting, and Voice API platforms.

The British telecommunications and network services provider confirmed that the attack began on August 12, with its IT teams working around the clock to contain the impact and restore systems.

Founded in 1992 as City of London Telecommunications (COLT) and acquired by Fidelity Investments in 2015, the company operates in 30 countries across Europe, Asia, and North America. Colt’s network spans 75,000 km of fiber and connects over 900 data centers globally.

Initially, Colt described the disruption as a “technical issue”, but later acknowledged it was caused by a cyber incident. As a precaution, the company took several systems offline, leading to outages in support platforms such as Colt Online and Voice API. Customers are currently unable to use the online portals and have been advised to reach out via email or phone, with delays in response times expected.

Colt emphasized that the affected systems are support services and that its core network infrastructure remains intact. However, the company has not provided an estimated timeline for service restoration. Authorities have been notified, though no details about the attackers or attack method were disclosed.

A hacker under the alias ‘cnkjasdfgd’, allegedly linked to the WarLock ransomware group, claimed responsibility for the breach. The threat actor is reportedly offering to sell one million stolen Colt documents for $200,000. The leaked samples include financial records, employee and customer data, internal emails, executive information, and software development files.

While Colt has not confirmed the breach details, cybersecurity expert Kevin Beaumont suggested that attackers may have exploited a critical Microsoft SharePoint remote code execution vulnerability (CVE-2025-53770). The flaw, patched by Microsoft on July 21, had been actively exploited as a zero-day since July 18.

Beaumont further noted that hackers might have exfiltrated hundreds of gigabytes of sensitive files.

Responding to the claims, a Colt spokesperson told BleepingComputer: "We’re aware of claims regarding the cyber incident. We are currently investigating these claims."

"Our technical team is focused on restoring the internal systems impacted by the cyber incident and is working closely with third-party cyber experts. We are grateful for our customers’ understanding as we work towards a resolution to fix the impacted internal systems."