

This latest SharePoint scam demonstrates how crafty attackers can be, and how easily employees can fall victim if they’re not paying attention. According to the report, 43% of remote workers weren’t following security protocols and 36% were rushing and making mistakes. It credits the increase in successful phishing attacks to organisations’ inability to protect employees as they work from home. Microsoft’s warning came the same week that Egress released a report claiming that 73% of organisations have fallen victim to phishing in the past year. The primary phishing URL is a Google storage resource that points to an AppSpot domain that requires the user to sign in before finally serving another Google User Content domain with an Office 365 phishing page,” Microsoft notes. “The emails contain two URLs that have malformed HTTP headers.

Whereas a genuine message would come from the email address of the person who sent it (presumably a colleague), the phishing emails come an illegitimate address. To identify its true nature, you must look at the sender’s email address. The example above, for instance, contains a graphic with a file name and a link to open it – just as would happen if someone genuinely shared something with you. Users may have a hard time spotting these clues, though, because SharePoint does send legitimate emails like this. The scam campaign can be identified by its repeated references to email “referrals” and the fact that the messages appear to contain a document that has been shared by a colleague.
