MailGuard’s filter network is intercepting a new phishing campaign that uses a legitimate-looking SharePoint file share notification to trick recipients into entering their Microsoft 365 credentials. The scam is effective because it looks routine. It arrives as a SharePoint notification, it references a file “shared with you”, and it encourages a quick click to “view” what appears to be a business document.
The message presents as a file share invitation, indicating a document titled “Your signature is required” has been shared (see Image below). The sender name shown is for a legitimate individual who's work account has been compromised and used to mount the attack.
At a glance, it resembles the SharePoint sharing emails many organisations receive every day, which is exactly why it is dangerous. It appears that the associated Microsoft account of an innocent user has been compromised and is being used to distribute the lure. To protect their identity, their details have been obscured in the images below.
Clicking the call-to-action takes the recipient to a Microsoft lookalike sign-in flow hosted on a non-Microsoft domain. It begins with a 'Proposal' in the file titled 'Your signature is required', and clicking the link in the file takes users to the Microsoft credential phishing site outlined below.
The attack follows a familiar credential-harvesting pattern:
Page 1 requests an email address (see Image below, “Sign in” page).
Page 2 requests a password (see Image below, “Enter password” page).
The page appears to validate credentials and can loop error messages (see Image below, “Your account or password is incorrect”), which is consistent with phishing kits that attempt to use the submitted credentials in real time.
MailGuard’s operations team was unable to progress past the password stage with multiple attempts, indicating the site may be actively attempting authentication behind the scenes with the details entered by victims.
This campaign is built around trust and momentum:
Use this quick checklist before interacting with any file-share or “signature required” email:
MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.
Avoid emails that:
Many businesses turn to MailGuard after a near miss or incident. Don't wait until it's too late. Reach out to our team for a confidential discussion by emailing expert@mailguard.com.au or calling 1300 30 44 30.
All that it takes to devastate your business is a cleverly worded email message that can steal sensitive user credentials or disrupt your business operations. If scammers can trick one person in your company into clicking on a malicious link or attachment, they can gain access to your data or inflict damage on your business.
For a few dollars per staff member per month, you can protect your business with MailGuard's specialist AI-powered, zero-day email security. Special Ops for when speed matters! Our real-time zero-day, email threat detection amplifies our client’s intelligence, knowledge, security and defence. Talk to a solution consultant at MailGuard today about securing your company's inboxes.
Stay up-to-date with MailGuard's latest blog posts by subscribing to free updates. Subscribe to weekly updates by clicking on the button below.