MailGuard is intercepting a new wave of phishing emails spoofing OneDrive to lure users into revealing their login credentials. This simple yet deceptive scam highlights the persistent threat of credential harvesting attacks that continue to bypass standard email defences.
This campaign is built on a clean HTML email that claims to share a document via OneDrive. The message appears to come from a legitimate sender, using a subject line such as “You received Contract Form 6122025\_2JD01,” and urges the recipient to click a button to "View Document".
Here’s an example of one of the emails 👇
Initial Login Attempt
Victims are prompted to enter their username and password to access the shared file.
Credential Harvesting
The first login attempt always results in an error message: "User credentials do not match. Try again!" This encourages users to re-enter their details, which are then captured by the attackers.
After the second submission, users are redirected to the official Adobe site at www.adobe.com/acrobat/pdf-reader.html to complete the illusion of legitimacy.
This multi-step trick is a classic credential phishing tactic, designed to evade suspicion and deepen the false sense of authenticity.
The scam emails are being sent from compromised or spoofed email addresses using the domain “@preferred-press.com”. The display name varies but often uses the format: `Notification From [CustomerName]`.
Common Subject Lines
There are quite a few subject variations but most have "6122025_2JD01" in them:
This level of variation is a hallmark of phishing campaigns attempting to evade pattern-based filters.
These emails do not contain malware attachments. Instead, they rely on social engineering and impersonation to trick users into giving up their credentials. Once compromised, those credentials can be used to access corporate email systems, launch further spear phishing campaigns, or exfiltrate sensitive business data.
These types of scams can cause reputational damage, data breaches, and financial loss — particularly when one compromised account provides access to broader systems or customer records.
MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.
Avoid emails that:
Many businesses turn to MailGuard after a near miss or incident. Don't wait until it's too late. Reach out to our team for a confidential discussion by emailing expert@mailguard.com.au or calling 1300 30 44 30.
All that it takes to devastate your business is a cleverly worded email message that can steal sensitive user credentials or disrupt your business operations. If scammers can trick one person in your company into clicking on a malicious link or attachment, they can gain access to your data or inflict damage on your business.
For a few dollars per staff member per month, you can protect your business with MailGuard's specialist, 'zero zero-day' email security. Special Ops for when speed matters! Our real-time 'zero zero-day', email threat detection amplifies our client’s intelligence, knowledge, security and defence. Talk to a solution consultant at MailGuard today about securing your company's inboxes.
Stay up-to-date with MailGuard's latest blog posts by subscribing to free updates. Subscribe to weekly updates by clicking on the button below.