Security News > 2021 > April > Microsoft Office SharePoint Targeted With High-Risk Phish, Ransomware Attacks
SharePoint servers are being picked at with high-risk, legitimate-looking, branded phish messages and preyed on by a ransomware gang using an old bug.
The phish is targeting Office 365 users with a legitimate-looking SharePoint document that claims to urgently need an email signature.
Jeff Costlow, CISO of ExtraHop, told Threatpost on Wednesday that the ransomware attacks against the 2019 vulnerability affecting SharePoint servers are the more insidious threat in the double whammy, in that they install remote control software and thus allow direct access to the infrastructure where attackers can freely frolic.
"Anyone using SharePoint needs to ensure that they are patching any instances of SharePoint to avoid the malware/ransomware installations. Long term, no amount of patching will solve the phishing problem. It's too easy for attackers to build sites that mimic legitimate sites. We need to rethink how sharing is done. Security teams need to take a proactive stance to help their users conduct business safely. There are various tactics to help alert users to possible attacks, such as setting up each SharePoint server to use a familiar background or image for users to ensure that they only input credentials on legitimate sites."
Cofense told Threatpost in an email on Wednesday morning that there's no apparent connection between the SharePoint phishing campaign that its analysts uncovered and the Wickr/Hello ransomware gang's ongoing exploitation of SharePoint server vulnerabilities.
Finally, the criminal ransomware attackers come in, socialize the exploit on Dark Net sites and use it to launch their own attacks.
News URL
https://threatpost.com/sharepoint-phish-ransomware-attacks/165671/
Related news
- Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks (source)
- Microsoft Office 2024 now available for Windows and macOS users (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)
- Ransomware gang using stolen Microsoft Entra ID creds to bust into the cloud (source)
- Embargo ransomware escalates attacks to cloud environments (source)
- Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- DOJ, Microsoft seize 107 domains used in Russia's Star Blizzard phishing attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)