Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

By Published On: January 27, 2026

 

The Silent Compromise: AiTM Phishing Weaponizes SharePoint in Energy Sector Attacks

In an alarming escalation of cyber threats, sophisticated adversary-in-the-middle (AiTM) phishing campaigns are actively exploiting trusted services like Microsoft SharePoint to infiltrate critical sectors. Recent findings by Microsoft Defender researchers have laid bare a multi-stage attack specifically targeting energy sector organizations, demonstrating a chilling evolution in how threat actors bypass traditional security measures. This isn’t merely about stolen credentials; it’s about a methodical approach to achieving widespread business email compromise (BEC) through seemingly legitimate channels.

Initial Vector: The Trusted Vendor Impersonation

The genesis of this elaborate campaign highlights a critical vulnerability: trust. The initial compromise wasn’t executed through overtly suspicious emails but rather through phishing emails originating from a compromised trusted vendor’s account. This method immediately bypasses many early-stage email filters and user skepticism, as the communication appears authentic and familiar. Recipients, believing they are interacting with a known entity, are far more likely to engage with malicious links or attachments.

AiTM Phishing: The Gateway to Deeper Access

The core of this attack lies in its use of AiTM phishing. Unlike traditional phishing, which simply tricks users into revealing credentials, AiTM attacks actively intercept and relay real-time communications between a user and a legitimate service. When a victim attempts to log into a service (e.g., SharePoint, Outlook), the AiTM proxy sits in the middle, forwarding the login request to the legitimate service and then relaying the response, including multi-factor authentication (MFA) tokens, back to the user. This effectively neutralizes many MFA protections that are designed to thwart credential theft, allowing the attacker to capture session cookies and gain persistent access to user accounts.

SharePoint Abuse: A New Frontier for Malicious Infrastructure

Once initial access was established, the threat actors didn’t just exfiltrate data. They leveraged the compromised accounts and, crucially, SharePoint’s file-sharing capabilities as a command and control (C2) infrastructure. By uploading malicious files, scripts, or even hosting phishing pages within SharePoint sites, attackers can:

  • Evade network security solutions that typically trust traffic to and from Microsoft 365 services.
  • Distribute further phishing lures or malware to other internal users.
  • Store stolen data in a seemingly legitimate cloud environment before exfiltration.
  • Maintain persistence and expand their foothold across the organization and potentially to connected entities.

This exploitation of trusted cloud services represents a significant shift from traditional attacker methodologies, making detection and mitigation considerably more challenging.

Evolution to Business Email Compromise (BEC)

The ultimate goal of this campaign extended beyond mere account takeover. The compromised user accounts and the subsequent abuse of SharePoint led directly to widespread BEC operations. With unimpeded access to email correspondence, contacts, and internal documents, threat actors were able to:

  • Impersonate senior executives to initiate fraudulent financial transactions.
  • Send targeted phishing emails to partners and customers of the victim organization.
  • Gather intelligence for future, more sophisticated attacks.
  • Manipulate business processes by sending fraudulent invoices or altering payment instructions.

The financial and reputational damage from such BEC campaigns can be catastrophic, demonstrating the severe consequences of even an “initial” compromise via AiTM phishing.

Remediation Actions

Defending against such sophisticated multi-stage attacks requires a multifaceted approach focused on both technical controls and user education. Organizations, especially those in critical sectors like energy, must prioritize these actions:

  • Strengthen MFA Implementations: While AiTM bypasses some MFA, robust MFA solutions (e.g., FIDO2 security keys, number matching prompts in authenticator apps) are more resilient than SMS or simple push notifications. Continuously evaluate and upgrade MFA technologies.
  • Implement Conditional Access Policies: Enforce strict policies that limit access based on device health, location, IP ranges, and user risk scores. This can detect and block suspicious login attempts even if credentials or session tokens are compromised.
  • Enhance Email Security Gateways (ESGs): Deploy advanced ESGs with AI/ML capabilities to detect sophisticated phishing, impersonation attacks, and BEC attempts. Regularly review and tune these systems.
  • Security Awareness Training: Continuously educate users about AiTM phishing tactics, including how to identify suspicious URLs, even if they appear to be legitimate services. Emphasize reporting suspicious emails.
  • Monitor Microsoft 365 Audit Logs: Implement continuous monitoring of SharePoint, Exchange Online, and Azure AD audit logs for unusual activities, such as:
    • Unusual file uploads or sharing activities in SharePoint.
    • Login anomalies (e.g., impossible travel, logins from new IPs/devices).
    • Creation of mailbox rules or changes to forwarding settings.
  • Implement Microsoft Defender for Cloud Apps (MDCA): Utilize MDCA or similar Cloud Access Security Brokers (CASBs) to detect anomalous behavior within cloud applications, including SharePoint, and enforce granular access controls.
  • Zero Trust Architecture: Adopt a Zero Trust security model, where every access request is verified regardless of whether it originates inside or outside the network.
  • Regular Penetration Testing and Red Teaming: Conduct periodic simulations of AiTM phishing and BEC scenarios to test the effectiveness of existing controls and identify weaknesses.

Conclusion

The targeting of energy sector organizations through AiTM phishing and the subsequent abuse of SharePoint services underscores the evolving landscape of cyber threats. Threat actors are increasingly leveraging trusted platforms and sophisticated techniques to circumvent traditional defenses. Organizations must move beyond basic security measures, investing in advanced detection capabilities, robust MFA, stringent access controls, and comprehensive security awareness programs to protect against these persistent and cunning adversaries. Proactive defense and a deep understanding of attacker methodologies are paramount to safeguarding critical infrastructure and business operations.

 

Share this article

Leave A Comment