{"id":20841,"date":"2023-03-23T14:05:27","date_gmt":"2023-03-23T10:05:27","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/sharepoint-notification-scam\/20841\/"},"modified":"2023-03-23T14:05:37","modified_gmt":"2023-03-23T10:05:37","slug":"sharepoint-notification-scam","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/sharepoint-notification-scam\/20841\/","title":{"rendered":"SharePoint as a phishing tool"},"content":{"rendered":"<p>A phishing link in the e-mail body is a thing of the past. Mail filters now detect this trick with near 100% efficiency. That\u2019s why cybercriminals are constantly inventing new ways to get their hands on corporate login credentials. We recently came across a rather interesting method that makes use of perfectly legitimate SharePoint servers. In this post, we explain how the scheme works, and what employees should look out for to avoid trouble.\n<\/p>\n<h2>Anatomy of SharePoint phishing<\/h2>\n<p>\nThe employee receives a standard notification about someone sharing a file. This is unlikely to arouse suspicion (especially if the company where the employee works does actually use SharePoint). This is \u00a0because it\u2019s a real notification from a real SharePoint server.<\/p>\n<div id=\"attachment_47595\" style=\"width: 1239px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47595\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/23140422\/sharepoint-notification-scam-notification.jpg\" alt=\"Legitimate notification from a SharePoint server.\" width=\"1229\" height=\"752\" class=\"size-full wp-image-47595\"><p id=\"caption-attachment-47595\" class=\"wp-caption-text\">Legitimate notification from a SharePoint server.<\/p><\/div>\n<p>The unsuspecting employee clicks the link and is taken to the genuine SharePoint server, where the supposed OneNote file appears as intended. Only, inside it looks like another file notification and contains an oversized icon (this time of a PDF file). Assuming this to be another step in the download process, the victim clicks the link \u2014 now a standard phishing one.<\/p>\n<div id=\"attachment_47596\" style=\"width: 1287px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47596\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/23140436\/sharepoint-notification-scam-sharepoint.jpg\" alt=\"Contents of the supposed OneNote file on the SharePoint server.\" width=\"1277\" height=\"715\" class=\"size-full wp-image-47596\"><p id=\"caption-attachment-47596\" class=\"wp-caption-text\">Contents of the supposed OneNote file on the SharePoint server.<\/p><\/div>\n<p>This link in turn opens a standard phishing site that mimics the OneDrive login page, which readily steals credentials for Yahoo!, AOL, Outlook, Office 365, or another e-mail service.<\/p>\n<div id=\"attachment_47597\" style=\"width: 1289px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47597\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/23140511\/sharepoint-notification-scam-site.jpg\" alt=\"Fake Microsoft OneDrive login page.\" width=\"1279\" height=\"687\" class=\"size-full wp-image-47597\"><p id=\"caption-attachment-47597\" class=\"wp-caption-text\">Fake Microsoft OneDrive login page.<\/p><\/div>\n<h2>Why this type of phishing is especially dangerous<\/h2>\n<p>\nThis is <a href=\"https:\/\/www.kaspersky.com\/blog\/sharepoint-phishing-attack\/25515\/\" target=\"_blank\" rel=\"noopener nofollow\">by no means the first case<\/a> of SharePoint-based phishing. However, this time the attackers don\u2019t only hide the phishing link on a SharePoint server, but distribute it through the platform\u2019s native notification mechanism. This is possible because, thanks to Microsoft developers, SharePoint has a feature that allows you to share a file that\u2019s on a corporate SharePoint site with external participants who don\u2019t have direct access to the server. <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/share-sharepoint-files-or-folders-1fe37332-0f9a-4719-970e-d2578da4941c\" target=\"_blank\" rel=\"nofollow noopener\">Instructions<\/a> on how to do this are given on the company\u2019s website.<\/p>\n<p>All the attackers have to do is gain access to someone\u2019s SharePoint server (using a similar or any other phishing trick). That done, they upload the file with the link and add a list of e-mails to share it with. SharePoint itself helpfully notifies the e-mail owners. And these notifications will sail through all filters since they come from the legitimate service of some real company.<\/p>\n<h2>How to stay safe<\/h2>\n<p>\nTo prevent your employees falling victim to scam e-mails, they need to be able to spot the telltale signs. In this case, the obvious red flags are as follows:\n<\/p>\n<ul>\n<li>When we don\u2019t know who shared the file (it\u2019s good practice to never open files from strangers).<\/li>\n<li>When we don\u2019t know what kind of file it is (people normally don\u2019t share files off the cuff without an explanation of what they sent and why).<\/li>\n<li>The e-mail talks about a OneNote file \u2014 but on the server we see a PDF.<\/li>\n<li>The file download link takes us to a third-party site that has nothing to do with either the victim\u2019s company or SharePoint.<\/li>\n<li>The file supposedly resides on a SharePoint server, yet the site mimics OneDrive \u2014 these are two different Microsoft services.<\/li>\n<\/ul>\n<p>\nTo make sure, we recommend holding regular security-awareness trainings for employees. A <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">specialized online platform<\/a> can help with this.<\/p>\n<p>What the above-described ploy clearly demonstrates is that security solutions with anti-phishing technology must be installed not only at the <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">corporate mail server level<\/a> but on all employees\u2019 <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">work devices<\/a> as well.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.<\/p>\n","protected":false},"author":2598,"featured_media":20843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1815,38,76,2022],"class_list":{"0":"post-20841","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-e-mail","11":"tag-microsoft","12":"tag-phishing","13":"tag-sharepoint"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/sharepoint-notification-scam\/20841\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/sharepoint-notification-scam\/25402\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sharepoint-notification-scam\/28012\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sharepoint-notification-scam\/25700\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/sharepoint-notification-scam\/26123\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/sharepoint-notification-scam\/28573\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/sharepoint-notification-scam\/34888\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sharepoint-notification-scam\/47593\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/sharepoint-notification-scam\/20363\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/sharepoint-notification-scam\/20983\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/sharepoint-notification-scam\/29934\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/sharepoint-notification-scam\/26010\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20841"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20841\/revisions"}],"predecessor-version":[{"id":20842,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20841\/revisions\/20842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20843"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}